diff --git a/doc/haskell-users-guide.xml b/doc/haskell-users-guide.xml
new file mode 100644
index 00000000000..ca6c387e8df
--- /dev/null
+++ b/doc/haskell-users-guide.xml
@@ -0,0 +1,757 @@
+
+
+User's Guide to the Haskell Infrastructure
+
+
+ How to install Haskell packages
+
+ Nixpkgs distributes build instructions for all Haskell packages
+ registered on
+ Hackage, but
+ strangely enough normal Nix package lookups don't seem to discover
+ any of them:
+
+
+$ nix-env -qa cabal-install
+error: selector ‘cabal-install’ matches no derivations
+
+$ nix-env -i ghc
+error: selector ‘ghc’ matches no derivations
+
+
+ The Haskell package set is not registered in the top-level namespace
+ because it is huge. If all Haskell packages
+ were visible to these commands, then name-based search/install
+ operations would be much slower than they are now. We avoided that
+ by keeping all Haskell-related packages in a separate attribute set
+ called haskellPackages, which the following
+ command will list:
+
+
+$ nix-env -f "<nixpkgs>" -qaP -A haskellPackages
+haskellPackages.a50 a50-0.5
+haskellPackages.abacate haskell-abacate-0.0.0.0
+haskellPackages.abcBridge haskell-abcBridge-0.12
+haskellPackages.afv afv-0.1.1
+haskellPackages.alex alex-3.1.4
+haskellPackages.Allure Allure-0.4.101.1
+haskellPackages.alms alms-0.6.7
+[... some 8000 entries omitted ...]
+
+
+ To install any of those packages into your profile, refer to them by
+ their attribute path (first column):
+
+
+$ nix-env -f "<nixpkgs>" -iA haskellPackages.Allure ...
+
+
+ The attribute path of any Haskell packages corresponds to the name
+ of that particular package on Hackage: the package
+ cabal-install has the attribute
+ haskellPackages.cabal-install, and so on.
+ (Actually, this convention causes trouble with packages like
+ 3dmodels and 4Blocks, because
+ these names are invalid identifiers in the Nix language. The issue
+ of how to deal with these rare corner cases is currently
+ unresolved.)
+
+
+ Haskell packages who's Nix name (second column) begins with a
+ haskell- prefix are packages that provide a
+ library whereas packages without that prefix provide just
+ executables. Libraries may provide executables too, though: the
+ package haskell-pandoc, for example, installs
+ both a library and an application. You can install and use Haskell
+ executables just like any other program in Nixpkgs, but using
+ Haskell libraries for development is a bit trickier and we'll
+ address that subject in great detail in section
+ How to
+ create a development environment.
+
+
+ Attribute paths are deterministic inside of Nixpkgs, but the path
+ necessary to reach Nixpkgs varies from system to system. We dodged
+ that problem by giving nix-env an explicit
+ -f "<nixpkgs>" parameter, but if
+ you call nix-env without that flag, then chances
+ are the invocation fails:
+
+
+$ nix-env -iA haskellPackages.cabal-install
+error: attribute ‘haskellPackages’ in selection path
+ ‘haskellPackages.cabal-install’ not found
+
+
+ On NixOS, for example, Nixpkgs does not exist
+ in the top-level namespace by default. To figure out the proper
+ attribute path, it's easiest to query for the path of a well-known
+ Nixpkgs package, i.e.:
+
+
+$ nix-env -qaP coreutils
+nixos.pkgs.coreutils coreutils-8.23
+
+
+ If your system responds like that (most NixOS installatios will),
+ then the attribute path to haskellPackages is
+ nixos.pkgs.haskellPackages. Thus, if you want to
+ use nix-env without giving an explicit
+ -f flag, then that's the way to do it:
+
+
+$ nix-env -qaP -A nixos.pkgs.haskellPackages
+$ nix-env -iA nixos.pkgs.haskellPackages.cabal-install
+
+
+ Our current default compiler is GHC 7.10.x and the
+ haskellPackages set contains packages built with
+ that particular version. Nixpkgs contains the latest major release
+ of every GHC since 6.10.4, however, and there is a whole family of
+ package sets available that defines Hackage packages built with each
+ of those compilers, too:
+
+
+$ nix-env -f "<nixpkgs>" -qaP -A haskell.packages.ghc6123
+$ nix-env -f "<nixpkgs>" -qaP -A haskell.packages.ghc763
+
+
+ The name haskellPackages is really just a synonym
+ for haskell.packages.ghc7101, because we prefer
+ that package set internally and recommend it to our users as their
+ default choice, but ultimately you are free to compile your Haskell
+ packages with any GHC version you please. The following command
+ displays the complete list of available compilers:
+
+
+$ nix-env -f "<nixpkgs>" -qaP -A haskell.compiler
+haskell.compiler.ghc6104 ghc-6.10.4
+haskell.compiler.ghc6123 ghc-6.12.3
+haskell.compiler.ghc704 ghc-7.0.4
+haskell.compiler.ghc722 ghc-7.2.2
+haskell.compiler.ghc742 ghc-7.4.2
+haskell.compiler.ghc763 ghc-7.6.3
+haskell.compiler.ghc784 ghc-7.8.4
+haskell.compiler.ghc7101 ghc-7.10.1
+haskell.compiler.ghcHEAD ghc-7.11.20150402
+haskell.compiler.ghcjs ghcjs-0.1.0
+haskell.compiler.jhc jhc-0.8.2
+haskell.compiler.uhc uhc-1.1.9.0
+
+
+ We have no package sets for jhc or
+ uhc yet, unfortunately, but for every version of
+ GHC listed above, there exists a package set based on that compiler.
+ Also, the attributes haskell.compiler.ghcXYC and
+ haskell.packages.ghcXYC.ghc are synonymous for
+ the sake of convenience.
+
+
+
+ How to create a development environment
+
+ How to install a compiler
+
+ A simple development environment consists of a Haskell compiler
+ and the tool cabal-install, and we saw in
+ section How to
+ install Haskell packages how you can install those programs
+ into your user profile:
+
+
+$ nix-env -f "<nixpkgs>" -iA haskellPackages.ghc haskellPackages.cabal-install
+
+
+ Instead of the default package set
+ haskellPackages, you can also use the more
+ precise name haskell.compiler.ghc7101, which
+ has the advantage that it refers to the same GHC version
+ regardless of what Nixpkgs considers "default" at any
+ given time.
+
+
+ Once you've made those tools available in
+ $PATH, it's possible to build Hackage packages
+ the same way people without access to Nix do it all the time:
+
+
+$ cabal get lens-4.11 && cd lens-4.11
+$ cabal install -j --dependencies-only
+$ cabal configure
+$ cabal build
+
+
+ If you enjoy working with Cabal sandboxes, then that's entirely
+ possible too: just execute the command
+
+
+$ cabal sandbox init
+
+
+ before installing the required dependencies.
+
+
+ The nix-shell utility makes it easy to switch
+ to a different compiler version; just enter the Nix shell
+ environment with the command
+
+
+$ nix-shell -p haskell.compiler.ghc784
+
+
+ to bring GHC 7.8.4 into $PATH. Re-running
+ cabal configure switches your build to use that
+ compiler instead. If you're working on a project that doesn't
+ depend on any additional system libraries outside of GHC, then
+ it's sufficient even to run the cabal configure
+ command inside of the shell:
+
+
+$ nix-shell -p haskell.compiler.ghc784 --command "cabal configure"
+
+
+ Afterwards, all other commands like cabal build
+ work just fine in any shell environment, because the configure
+ phase recorded the absolute paths to all required tools like GHC
+ in its build configuration inside of the dist/
+ directory. Please note, however, that
+ nix-collect-garbage can break such an
+ environment because the Nix store paths created by
+ nix-shell aren't "alive" anymore once
+ nix-shell has terminated. If you find that your
+ Haskell builds no longer work after garbage collection, then
+ you'll have to re-run cabal configure inside of
+ a new nix-shell environment.
+
+
+
+ How to install a compiler with libraries
+
+ GHC expects to find all installed libraries inside of its own
+ lib directory. This approach works fine on
+ traditional Unix systems, but it doesn't work for Nix, because
+ GHC's store path is immutable once it's built. We cannot install
+ additional libraries into that location. As a consequence, our
+ copies of GHC don't know any packages except their own core
+ libraries, like base,
+ containers, Cabal, etc.
+
+
+ We can register additional libraries to GHC, however, using a
+ special build function called ghcWithPackages.
+ That function expects one argument: a function that maps from an
+ attribute set of Haskell packages to a list of packages, which
+ determines the libraries known to that particular version of GHC.
+ For example, the Nix expression
+ ghcWithPackages (pkgs: [pkgs.mtl]) generates a
+ copy of GHC that has the mtl library registered
+ in addition to its normal core packages:
+
+
+$ nix-shell -p "haskellPackages.ghcWithPackages (pkgs: [pkgs.mtl])"
+
+[nix-shell:~]$ ghc-pkg list mtl
+/nix/store/zy79...-ghc-7.10.1/lib/ghc-7.10.1/package.conf.d:
+ mtl-2.2.1
+
+
+ This function allows users to define their own development
+ environment by means of an override. After adding the following
+ snippet to ~/.nixpkgs/config.nix,
+
+
+{
+ packageOverrides = super: let self = super.pkgs; in
+ {
+ myHaskellEnv = self.haskell.packages.ghc7101.ghcWithPackages
+ (haskellPackages: with haskellPackages; [
+ # libraries
+ arrows async cgi criterion
+ # tools
+ cabal-install haskintex
+ ]);
+ };
+}
+
+
+ it's possible to install that compiler with
+ nix-env -f "<nixpkgs>" -iA myHaskellEnv.
+ If you'd like to switch that development environment to a
+ different version of GHC, just replace the
+ ghc7101 bit in the previous definition with the
+ appropriate name. Of course, it's also possible to define any
+ number of these development environments! (You can't install two
+ of them into the same profile at the same time, though, because
+ that would result in file conflicts.)
+
+
+ The generated ghc program is a wrapper script
+ that re-directs the real GHC executable to use a new
+ lib directory --- one that we specifically
+ constructed to contain all those packages the user requested:
+
+
+$ cat $(type -p ghc)
+#! /nix/store/xlxj...-bash-4.3-p33/bin/bash -e
+export NIX_GHC=/nix/store/19sm...-ghc-7.10.1/bin/ghc
+export NIX_GHCPKG=/nix/store/19sm...-ghc-7.10.1/bin/ghc-pkg
+export NIX_GHC_DOCDIR=/nix/store/19sm...-ghc-7.10.1/share/doc/ghc/html
+export NIX_GHC_LIBDIR=/nix/store/19sm...-ghc-7.10.1/lib/ghc-7.10.1
+exec /nix/store/j50p...-ghc-7.10.1/bin/ghc "-B$NIX_GHC_LIBDIR" "$@"
+
+
+ The variables $NIX_GHC,
+ $NIX_GHCPKG, etc. point to the
+ new store path
+ ghcWithPackages constructed specifically for
+ this environment. The last line of the wrapper script then
+ executes the real ghc, but passes the path to
+ the new lib directory using GHC's
+ -B flag.
+
+
+ The purpose of those environment variables is to work around an
+ impurity in the popular
+ ghc-paths
+ library. That library promises to give its users access to GHC's
+ installation paths. Only, the library can't possible know that
+ path when it's compiled, because the path GHC considers its own is
+ determined only much later, when the user configures it through
+ ghcWithPackages. So we
+ patched
+ ghc-paths to return the paths found in those environment
+ variables at run-time rather than trying to guess them at
+ compile-time.
+
+
+ To make sure that mechanism works properly all the time, we
+ recommend that you set those variables to meaningful values in
+ your shell environment, too, i.e. by adding the following code to
+ your ~/.bashrc:
+
+
+if type >/dev/null 2>&1 -p ghc; then
+ eval "$(egrep ^export "$(type -p ghc)")"
+fi
+
+
+ If you are certain that you'll use only one GHC environment which
+ is located in your user profile, then you can use the following
+ code, too, which has the advantage that it doesn't contain any
+ paths from the Nix store, i.e. those settings always remain valid
+ even if a nix-env -u operation updates the GHC
+ environment in your profile:
+
+
+if [ -e ~/.nix-profile/bin/ghc ]; then
+ export NIX_GHC="$HOME/.nix-profile/bin/ghc"
+ export NIX_GHCPKG="$HOME/.nix-profile/bin/ghc-pkg"
+ export NIX_GHC_DOCDIR="$HOME/.nix-profile/share/doc/ghc/html"
+ export NIX_GHC_LIBDIR="$HOME/.nix-profile/lib/ghc-$($NIX_GHC --numeric-version)"
+fi
+
+
+
+ How to create ad hoc environments for
+ nix-shell
+
+ The easiest way to create an ad hoc development environment is to
+ run nix-shell with the appropriate GHC
+ environment given on the command-line:
+
+
+nix-shell -p "haskellPackages.ghcWithPackages (pkgs: with pkgs; [mtl pandoc])"
+
+
+ For more sophisticated use-cases, however, it's more convenient to
+ save the desired configuration in a file called
+ shell.nix that looks like this:
+
+
+{ nixpkgs ? import <nixpkgs> {}, compiler ? "ghc7101" }:
+let
+ inherit (nixpkgs) pkgs;
+ ghc = pkgs.haskell.packages.${compiler}.ghcWithPackages (ps: with ps; [
+ monad-par mtl
+ ]);
+in
+pkgs.stdenv.mkDerivation {
+ name = "my-haskell-env-0";
+ buildInputs = [ ghc ];
+ shellHook = "eval $(egrep ^export ${ghc}/bin/ghc)";
+}
+
+
+ Now run nix-shell --- or even
+ nix-shell --pure --- to enter a shell
+ environment that has the appropriate compiler in
+ $PATH. If you use --pure,
+ then add all other packages that your development environment
+ needs into the buildInputs attribute. If you'd
+ like to switch to a different compiler version, then pass an
+ appropriate compiler argument to the
+ expression, i.e.
+ nix-shell --argstr compiler ghc784.
+
+
+ If you need such an environment because you'd like to compile a
+ Hackage package outside of Nix --- i.e. because you're hacking on
+ the latest version from Git ---, then the package set provides
+ suitable nix-shell environments for you already! Every Haskell
+ package has an env attribute that provides a
+ shell environment suitable for compiling that particular package.
+ If you'd like to hack the lens library, for
+ example, then you just have to check out the source code and enter
+ the appropriate environment:
+
+
+ $ cabal get lens-4.11 && cd lens-4.11
+ Downloading lens-4.11...
+ Unpacking to lens-4.11/
+
+ $ nix-shell "<nixpkgs>" -A haskellPackages.lens.env
+ [nix-shell:/tmp/lens-4.11]$
+
+
+ At point, you can run cabal configure,
+ cabal build, and all the other development
+ commands. Note that you need cabal-install
+ installed in your $PATH already to use it here
+ --- the nix-shell environment does not provide
+ it.
+
+
+
+
+ How to create Nix builds for your own private Haskell
+ packages
+
+ If your own Haskell packages have build instructions for Cabal, then
+ you can convert those automatically into build instructions for Nix
+ using the cabal2nix utility, which you can
+ install into your profile by running
+ nix-env -i cabal2nix.
+
+
+ How to build a stand-alone project
+
+ For example, let's assume that you're working on a private project
+ called foo. To generate a Nix build expression
+ for it, change into the project's top-level directory and run the
+ command:
+
+
+$ cabal2nix . >foo.nix
+
+
+ Then write the following snippet into a file called
+ default.nix:
+
+
+{ nixpkgs ? import <nixpkgs> {}, compiler ? "ghc7101" }:
+nixpkgs.pkgs.haskell.packages.${compiler}.callPackage ./foo.nix { }
+
+
+ Finally, store the following code in a file called
+ shell.nix:
+
+
+{ nixpkgs ? import <nixpkgs> {}, compiler ? "ghc7101" }:
+(import ./default.nix { inherit nixpkgs compiler; }).env
+
+
+ At this point, you can run nix-build to have
+ Nix compile your project and install it into a Nix store path. The
+ local directory will contain a symlink called
+ result after nix-build
+ returns that points into that location. Of course, passing the
+ flag --argstr compiler ghc763 allows switching
+ the build to any version of GHC currently supported.
+
+
+ Furthermore, you can call nix-shell to enter an
+ interactive development environment in which you can use
+ cabal configure and
+ cabal build to develop your code. That
+ environment will automatically contain a proper GHC derivation
+ with all the required libraries registered as well as all the
+ system-level libraries your package might need.
+
+
+ If your package does not depend on any system-level libraries,
+ then it's sufficient to run
+
+
+$ nix-shell --command "cabal configure"
+
+
+ once to set up your build. cabal-install
+ determines the absolute paths to all resources required for the
+ build and writes them into a config file in the
+ dist/ directory. Once that's done, you can run
+ cabal build and any other command for that
+ project even outside of the nix-shell
+ environment. This feature is particularly nice for those of us who
+ like to edit their code with an IDE, like Emacs'
+ haskell-mode, because it's not necessary to
+ start Emacs inside of nix-shell just to make it find out the
+ necessary settings for building the project;
+ cabal-install has already done that for us.
+
+
+ If you want to do some quick-and-dirty hacking and don't want to
+ bother setting up a default.nix and
+ shell.nix file manually, then you can use the
+ --shell flag offered by
+ cabal2nix to have it generate a stand-alone
+ nix-shell environment for you. With that
+ feature, running
+
+
+$ cabal2nix --shell . >shell.nix
+$ nix-shell --command "cabal configure"
+
+
+ is usually enough to set up a build environment for any given
+ Haskell package. You can even use that generated file to run
+ nix-build, too:
+
+
+$ nix-build shell.nix
+
+
+
+ How to build projects that depend on each other
+
+ If you have multiple private Haskell packages that depend on each
+ other, then you'll have to register those packages in the Nixpkgs
+ set to make them visible for the dependency resolution performed
+ by callPackage. First of all, change into each
+ of your projects top-level directories and generate a
+ default.nix file with
+ cabal2nix:
+
+
+$ cd ~/src/foo && cabal2nix . >default.nix
+$ cd ~/src/bar && cabal2nix . >default.nix
+
+
+ Then edit your ~/.nixpkgs/config.nix file to
+ register those builds in the default Haskell package set:
+
+
+ {
+ packageOverrides = super: let self = super.pkgs; in
+ {
+ haskellPackages = super.haskellPackages.override {
+ overrides = self: super: {
+ foo = self.callPackage ../src/foo {};
+ bar = self.callPackage ../src/bar {};
+ };
+ };
+ };
+ }
+
+
+ Once that's accomplished,
+ nix-env -f "<nixpkgs>" -qA haskellPackages
+ will show your packages like any other package from Hackage, and
+ you can build them
+
+
+$ nix-build "<nixpkgs>" -A haskellPackages.foo
+
+
+ or enter an interactive shell environment suitable for building
+ them:
+
+
+$ nix-shell "<nixpkgs>" -A haskellPackages.bar.env
+
+
+
+
+ Miscellaneous Topics
+
+ How to build with profiling enabled
+
+ Every Haskell package set takes a function called
+ overrides that you can use to manipulate the
+ package as much as you please. One useful application of this
+ feature is to replace the default mkDerivation
+ function with one that enables library profiling for all packages.
+ To accomplish that, add configure the following snippet in your
+ ~/.nixpkgs/config.nix file:
+
+
+{
+ packageOverrides = super: let self = super.pkgs; in
+ {
+ profiledHaskellPackages = self.haskellPackages.override {
+ overrides = self: super: {
+ mkDerivation = args: super.mkDerivation (args // {
+ enableLibraryProfiling = true;
+ });
+ };
+ };
+ };
+}
+
+
+
+ How to override package versions in a compiler-specific
+ package set
+
+ Nixpkgs provides the latest version of
+ ghc-events,
+ which is 0.4.4.0 at the time of this writing. This is fine for
+ users of GHC 7.10.x, but GHC 7.8.4 cannot compile that binary.
+ Now, one way to solve that problem is to register an older version
+ of ghc-events in the 7.8.x-specific package
+ set. The first step is to generate Nix build instructions with
+ cabal2nix:
+
+
+$ cabal2nix cabal://ghc-events-0.4.3.0 >~/.nixpkgs/ghc-events-0.4.3.0.nix
+
+
+ Then add the override in ~/.nixpkgs/config.nix:
+
+
+{
+ packageOverrides = super: let self = super.pkgs; in
+ {
+ haskell = super.haskell // {
+ packages = super.haskell.packages // {
+ ghc784 = super.haskell.packages.ghc784.override {
+ overrides = self: super: {
+ ghc-events = self.callPackage ./ghc-events-0.4.3.0.nix {};
+ };
+ };
+ };
+ };
+ };
+}
+
+
+ This code is a little crazy, no doubt, but it's necessary because
+ the intuitive version
+
+
+haskell.packages.ghc784 = super.haskell.packages.ghc784.override {
+ overrides = self: super: {
+ ghc-events = self.callPackage ./ghc-events-0.4.3.0.nix {};
+ };
+};
+
+
+ doesn't do what we want it to: that code replaces the
+ haskell package set in Nixpkgs with one that
+ contains only one entry,packages, which
+ contains only one entry ghc784. This override
+ loses the haskell.compiler set, and it loses
+ the haskell.packages.ghcXYZ sets for all
+ compilers but GHC 7.8.4. To avoid that problem, we have to perform
+ the convoluted little dance from above, iterating over each step
+ in hierarchy.
+
+
+ Once it's accomplished, however, we can install a variant of
+ ghc-events that's compiled with GHC 7.8.4:
+
+
+nix-env -f "<nixpkgs>" -iA haskell.packages.ghc784.ghc-events
+
+
+ Unfortunately, it turns out that this build fails again while
+ executing the test suite! Apparently, the release archive on
+ Hackage is missing some data files that the test suite requires,
+ so we cannot run it. We accomplish that by re-generating the Nix
+ expression with the --no-check flag:
+
+
+$ cabal2nix --no-check cabal://ghc-events-0.4.3.0 >~/.nixpkgs/ghc-events-0.4.3.0.nix
+
+
+ Now the builds succeeds.
+
+
+ Of course, in the concrete example of
+ ghc-events this whole exercise is not an ideal
+ solution, because ghc-events can analyze the
+ output emitted by any version of GHC later than 6.12 regardless of
+ the compiler version that was used to build the `ghc-events'
+ executable, so strictly speaking there's no reason to prefer one
+ built with GHC 7.8.x in the first place. However, for users who
+ cannot use GHC 7.10.x at all for some reason, the approach of
+ downgrading to an older version might be useful.
+
+
+
+ How to recover from GHC's infamous non-deterministic library
+ ID bug
+
+ GHC and distributed build farms don't get along well:
+
+
+https://ghc.haskell.org/trac/ghc/ticket/4012
+
+
+ When you see an error like this one
+
+
+package foo-0.7.1.0 is broken due to missing package
+text-1.2.0.4-98506efb1b9ada233bb5c2b2db516d91
+
+
+ then you have to download and re-install foo
+ and all its dependents from scratch:
+
+
+# nix-store -q --referrers /nix/store/*-haskell-text-1.2.0.4 \
+ | nix-store --repair-path --option binary-caches http://hydra.nixos.org
+
+
+ If you're using additional Hydra servers other than
+ hydra.nixos.org, then it might be necessary to
+ purge the local caches that store data from those machines to
+ disable these binary channels for the duration of the previous
+ command, i.e. by running:
+
+
+rm /nix/var/nix/binary-cache-v3.sqlite
+rm /nix/var/nix/manifests/*
+rm /nix/var/nix/channel-cache/*
+
+
+
+ Builds on Darwin fail with math.h not
+ found
+
+ Users of GHC on Darwin have occasionally reported that builds
+ fail, because the compiler complains about a missing include file:
+
+
+fatal error: 'math.h' file not found
+
+
+ The issue has been discussed at length in
+ ticket
+ 6390, and so far no good solution has been proposed. As a
+ work-around, users who run into this problem can configure the
+ environment variables
+
+
+export NIX_CFLAGS_COMPILE="-idirafter /usr/include"
+export NIX_CFLAGS_LINK="-L/usr/lib"
+
+
+ in their ~/.bashrc file to avoid the compiler
+ error.
+
+
+
+
+
diff --git a/doc/manual.xml b/doc/manual.xml
index 1b713b0c30c..a6400c98d6e 100644
--- a/doc/manual.xml
+++ b/doc/manual.xml
@@ -18,5 +18,6 @@
+
diff --git a/lib/maintainers.nix b/lib/maintainers.nix
index 174eced43c2..eaee076635f 100644
--- a/lib/maintainers.nix
+++ b/lib/maintainers.nix
@@ -1,11 +1,15 @@
/* -*- coding: utf-8; -*- */
{
- /* Add your name and email address here. Keep the list
- alphabetically sorted. */
+ /* Add your name and email address here.
+ Keep the list alphabetically sorted.
+ Prefer the same attrname as your github username, please,
+ so it's easy to ping a package @maintainer.
+ */
abaldeau = "Andreas Baldeau ";
abbradar = "Nikolay Amiantov ";
+ adev = "Adrien Devresse ";
aforemny = "Alexander Foremny ";
aflatter = "Alexander Flatter ";
aherrmann = "Andreas Herrmann ";
@@ -16,6 +20,7 @@
amiddelk = "Arie Middelkoop ";
amorsillo = "Andrew Morsillo ";
AndersonTorres = "Anderson Torres ";
+ anderspapitto = "Anders Papitto ";
andres = "Andres Loeh ";
antono = "Antono Vasiljev ";
ardumont = "Antoine R. Dumont ";
@@ -79,6 +84,7 @@
fluffynukeit = "Daniel Austin ";
forkk = "Andrew Okin ";
fpletz = "Franz Pletz ";
+ fro_ozen = "fro_ozen ";
ftrvxmtrx = "Siarhei Zirukin ";
funfunctor = "Edward O'Callaghan ";
fuuzetsu = "Mateusz Kowalczyk ";
@@ -186,6 +192,7 @@
rickynils = "Rickard Nilsson ";
rob = "Rob Vermaas ";
robberer = "Longrin Wischnewski ";
+ robbinch = "Robbin C. ";
roconnor = "Russell O'Connor ";
roelof = "Roelof Wobben ";
romildo = "José Romildo Malaquias ";
diff --git a/lib/modules.nix b/lib/modules.nix
index dcede0c46c6..73dbdd371f6 100644
--- a/lib/modules.nix
+++ b/lib/modules.nix
@@ -17,6 +17,10 @@ rec {
evalModules) and the less declarative the module set is. */
evalModules = { modules
, prefix ? []
+ , # This should only be used for special arguments that need to be evaluated
+ # when resolving module structure (like in imports). For everything else,
+ # there's _module.args.
+ specialArgs ? {}
, # This would be remove in the future, Prefer _module.args option instead.
args ? {}
, # This would be remove in the future, Prefer _module.check option instead.
@@ -39,7 +43,7 @@ rec {
};
_module.check = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
internal = true;
default = check;
description = "Whether to check whether all option definitions have matching declarations.";
@@ -51,7 +55,7 @@ rec {
};
};
- closed = closeModules (modules ++ [ internalModule ]) { inherit config options; lib = import ./.; };
+ closed = closeModules (modules ++ [ internalModule ]) (specialArgs // { inherit config options; lib = import ./.; });
# Note: the list of modules is reversed to maintain backward
# compatibility with the old module system. Not sure if this is
@@ -118,7 +122,7 @@ rec {
config = removeAttrs m ["key" "_file" "require" "imports"];
};
- applyIfFunction = f: arg@{ config, options, lib }: if isFunction f then
+ applyIfFunction = f: arg@{ config, options, lib, ... }: if isFunction f then
let
# Module arguments are resolved in a strict manner when attribute set
# deconstruction is used. As the arguments are now defined with the
diff --git a/lib/options.nix b/lib/options.nix
index eed43daaecc..bfc5b5fa2ae 100644
--- a/lib/options.nix
+++ b/lib/options.nix
@@ -59,26 +59,21 @@ rec {
else if all isInt list && all (x: x == head list) list then head list
else throw "Cannot merge definitions of `${showOption loc}' given in ${showFiles (getFiles defs)}.";
- /* Obsolete, will remove soon. Specify an option type or apply
- function instead. */
- mergeTypedOption = typeName: predicate: merge: loc: list:
- let list' = map (x: x.value) list; in
- if all predicate list then merge list'
- else throw "Expected a ${typeName}.";
-
- mergeEnableOption = mergeTypedOption "boolean"
- (x: true == x || false == x) (fold lib.or false);
-
- mergeListOption = mergeTypedOption "list" isList concatLists;
-
- mergeStringOption = mergeTypedOption "string" isString lib.concatStrings;
-
mergeOneOption = loc: defs:
if defs == [] then abort "This case should never happen."
else if length defs != 1 then
throw "The unique option `${showOption loc}' is defined multiple times, in ${showFiles (getFiles defs)}."
else (head defs).value;
+ /* "Merge" option definitions by checking that they all have the same value. */
+ mergeEqualOption = loc: defs:
+ if defs == [] then abort "This case should never happen."
+ else fold (def: val:
+ if def.value != val then
+ throw "The option `${showOption loc}' has conflicting definitions, in ${showFiles (getFiles defs)}."
+ else
+ val) (head defs).value defs;
+
getValues = map (x: x.value);
getFiles = map (x: x.file);
diff --git a/lib/types.nix b/lib/types.nix
index f22c7661634..0a54a5598f1 100644
--- a/lib/types.nix
+++ b/lib/types.nix
@@ -54,7 +54,7 @@ rec {
bool = mkOptionType {
name = "boolean";
check = isBool;
- merge = loc: fold (x: y: x.value || y) false;
+ merge = mergeEqualOption;
};
int = mkOptionType {
diff --git a/maintainers/scripts/gnome-latest.sh b/maintainers/scripts/gnome-latest.sh
index 9290b6deaff..63b309c5a77 100755
--- a/maintainers/scripts/gnome-latest.sh
+++ b/maintainers/scripts/gnome-latest.sh
@@ -1,4 +1,4 @@
-#!/bin/sh
+#!/usr/bin/env bash
GNOME_FTP="ftp.gnome.org/pub/GNOME/sources"
diff --git a/nixos/doc/manual/installation/installing-uefi.xml b/nixos/doc/manual/installation/installing-uefi.xml
index dbd5606c4a5..90d18695447 100644
--- a/nixos/doc/manual/installation/installing-uefi.xml
+++ b/nixos/doc/manual/installation/installing-uefi.xml
@@ -41,10 +41,6 @@ changes:
and
as well.
-
- To see console messages during early boot, add "fbcon"
- to your .
-
diff --git a/nixos/doc/manual/release-notes/rl-unstable.xml b/nixos/doc/manual/release-notes/rl-unstable.xml
index cf67014a69d..fcbf6ed0add 100644
--- a/nixos/doc/manual/release-notes/rl-unstable.xml
+++ b/nixos/doc/manual/release-notes/rl-unstable.xml
@@ -153,6 +153,19 @@ nix-env -f "<nixpkgs>" -iA haskellPackages.cabal-install
+
+
+ The OpenBLAS library has been updated to version
+ 0.2.14. Support for the
+ x86_64-darwin platform was added. Dynamic
+ architecture detection was enabled; OpenBLAS now selects
+ microarchitecture-optimized routines at runtime, so optimal
+ performance is achieved without the need to rebuild OpenBLAS
+ locally. OpenBLAS has replaced ATLAS in most packages which use an
+ optimized BLAS or LAPACK implementation.
+
+
+
diff --git a/nixos/lib/eval-config.nix b/nixos/lib/eval-config.nix
index adacbd0863e..97cb85a957f 100644
--- a/nixos/lib/eval-config.nix
+++ b/nixos/lib/eval-config.nix
@@ -47,6 +47,7 @@ in rec {
inherit prefix check;
modules = modules ++ extraModules ++ baseModules ++ [ pkgsModule ];
args = extraArgs;
+ specialArgs = { modulesPath = ../modules; };
}) config options;
# These are the extra arguments passed to every module. In
diff --git a/nixos/lib/make-channel.nix b/nixos/lib/make-channel.nix
new file mode 100644
index 00000000000..7764527ffa7
--- /dev/null
+++ b/nixos/lib/make-channel.nix
@@ -0,0 +1,31 @@
+{ pkgs, nixpkgs, version, versionSuffix }:
+
+pkgs.releaseTools.makeSourceTarball {
+ name = "nixos-channel";
+
+ src = nixpkgs;
+
+ officialRelease = false; # FIXME: fix this in makeSourceTarball
+ inherit version versionSuffix;
+
+ buildInputs = [ pkgs.nixUnstable ];
+
+ expr = builtins.readFile ./channel-expr.nix;
+
+ distPhase = ''
+ rm -rf .git
+ echo -n $VERSION_SUFFIX > .version-suffix
+ echo -n ${nixpkgs.rev or nixpkgs.shortRev} > .git-revision
+ releaseName=nixos-$VERSION$VERSION_SUFFIX
+ mkdir -p $out/tarballs
+ mkdir ../$releaseName
+ cp -prd . ../$releaseName/nixpkgs
+ chmod -R u+w ../$releaseName
+ ln -s nixpkgs/nixos ../$releaseName/nixos
+ echo "$expr" > ../$releaseName/default.nix
+ NIX_STATE_DIR=$TMPDIR nix-env -f ../$releaseName/default.nix -qaP --meta --xml \* > /dev/null
+ cd ..
+ chmod -R u+w $releaseName
+ tar cfJ $out/tarballs/$releaseName.tar.xz $releaseName
+ '';
+}
diff --git a/nixos/lib/test-driver/Machine.pm b/nixos/lib/test-driver/Machine.pm
index db2c1a68692..41088ed75f7 100644
--- a/nixos/lib/test-driver/Machine.pm
+++ b/nixos/lib/test-driver/Machine.pm
@@ -21,7 +21,7 @@ sub new {
my ($class, $args) = @_;
my $startCommand = $args->{startCommand};
-
+
my $name = $args->{name};
if (!$name) {
$startCommand =~ /run-(.*)-vm$/ if defined $startCommand;
@@ -34,7 +34,7 @@ sub new {
"qemu-kvm -m 384 " .
"-net nic,model=virtio \$QEMU_OPTS ";
my $iface = $args->{hdaInterface} || "virtio";
- $startCommand .= "-drive file=" . Cwd::abs_path($args->{hda}) . ",if=$iface,boot=on,werror=report "
+ $startCommand .= "-drive file=" . Cwd::abs_path($args->{hda}) . ",if=$iface,werror=report "
if defined $args->{hda};
$startCommand .= "-cdrom $args->{cdrom} "
if defined $args->{cdrom};
@@ -43,8 +43,6 @@ sub new {
$startCommand .= "-bios $args->{bios} "
if defined $args->{bios};
$startCommand .= $args->{qemuFlags} || "";
- } else {
- $startCommand = Cwd::abs_path $startCommand;
}
my $tmpDir = $ENV{'TMPDIR'} || "/tmp";
@@ -171,7 +169,7 @@ sub start {
eval {
local $SIG{CHLD} = sub { die "QEMU died prematurely\n"; };
-
+
# Wait until QEMU connects to the monitor.
accept($self->{monitor}, $monitorS) or die;
@@ -182,11 +180,11 @@ sub start {
$self->{socket}->autoflush(1);
};
die "$@" if $@;
-
+
$self->waitForMonitorPrompt;
$self->log("QEMU running (pid $pid)");
-
+
$self->{pid} = $pid;
$self->{booted} = 1;
}
@@ -241,7 +239,7 @@ sub connect {
alarm 300;
readline $self->{socket} or die "the VM quit before connecting\n";
alarm 0;
-
+
$self->log("connected to guest root shell");
$self->{connected} = 1;
@@ -270,7 +268,7 @@ sub isUp {
sub execute_ {
my ($self, $command) = @_;
-
+
$self->connect;
print { $self->{socket} } ("( $command ); echo '|!=EOF' \$?\n");
@@ -453,7 +451,7 @@ sub shutdown {
sub crash {
my ($self) = @_;
return unless $self->{booted};
-
+
$self->log("forced crash");
$self->sendMonitorCommand("quit");
diff --git a/nixos/maintainers/scripts/ec2/amazon-base-config.nix b/nixos/maintainers/scripts/ec2/amazon-base-config.nix
index d23f15e828b..28317317eab 100644
--- a/nixos/maintainers/scripts/ec2/amazon-base-config.nix
+++ b/nixos/maintainers/scripts/ec2/amazon-base-config.nix
@@ -1,5 +1,5 @@
{ modulesPath, ...}:
{
- imports = [ "${modulesPath}/virtualisation/amazon-config.nix" ];
+ imports = [ "${modulesPath}/virtualisation/amazon-init.nix" ];
services.journald.rateLimitBurst = 0;
}
diff --git a/nixos/modules/config/i18n.nix b/nixos/modules/config/i18n.nix
index f2aacf9b292..3622b21626b 100644
--- a/nixos/modules/config/i18n.nix
+++ b/nixos/modules/config/i18n.nix
@@ -43,7 +43,7 @@ in
consoleFont = mkOption {
type = types.str;
- default = "lat9w-16";
+ default = "Lat2-Terminus16";
example = "LatArCyrHeb-16";
description = ''
The font used for the virtual consoles. Leave empty to use
diff --git a/nixos/modules/config/pulseaudio.nix b/nixos/modules/config/pulseaudio.nix
index 566130feb6d..2ebc6126055 100644
--- a/nixos/modules/config/pulseaudio.nix
+++ b/nixos/modules/config/pulseaudio.nix
@@ -12,7 +12,7 @@ let
# Forces 32bit pulseaudio and alsaPlugins to be built/supported for apps
# using 32bit alsa on 64bit linux.
- enable32BitAlsaPlugins = stdenv.isx86_64 && (pkgs_i686.alsaLib != null && pkgs_i686.libpulseaudio != null);
+ enable32BitAlsaPlugins = cfg.support32Bit && stdenv.isx86_64 && (pkgs_i686.alsaLib != null && pkgs_i686.libpulseaudio != null);
ids = config.ids;
@@ -78,6 +78,15 @@ in {
'';
};
+ support32Bit = mkOption {
+ type = types.bool;
+ default = false;
+ description = ''
+ Whether to include the 32-bit pulseaudio libraries in the systemn or not.
+ This is only useful on 64-bit systems and currently limited to x86_64-linux.
+ '';
+ };
+
configFile = mkOption {
type = types.path;
description = ''
diff --git a/nixos/modules/config/shells-environment.nix b/nixos/modules/config/shells-environment.nix
index e5b342afcc4..bff0b299132 100644
--- a/nixos/modules/config/shells-environment.nix
+++ b/nixos/modules/config/shells-environment.nix
@@ -63,7 +63,7 @@ in
description = ''
A list of profiles used to setup the global environment.
'';
- type = types.listOf types.string;
+ type = types.listOf types.str;
};
environment.profileRelativeEnvVars = mkOption {
diff --git a/nixos/modules/hardware/video/bumblebee.nix b/nixos/modules/hardware/video/bumblebee.nix
index e20ebc3041e..e341eac4a81 100644
--- a/nixos/modules/hardware/video/bumblebee.nix
+++ b/nixos/modules/hardware/video/bumblebee.nix
@@ -26,7 +26,7 @@ in
hardware.bumblebee.group = mkOption {
default = "wheel";
example = "video";
- type = types.uniq types.str;
+ type = types.str;
description = ''Group for bumblebee socket'';
};
hardware.bumblebee.connectDisplay = mkOption {
diff --git a/nixos/modules/installer/cd-dvd/installation-cd-base.nix b/nixos/modules/installer/cd-dvd/installation-cd-base.nix
index 446d79ce220..bc3bd872d2a 100644
--- a/nixos/modules/installer/cd-dvd/installation-cd-base.nix
+++ b/nixos/modules/installer/cd-dvd/installation-cd-base.nix
@@ -7,8 +7,7 @@ with lib;
{
imports =
- [ ./channel.nix
- ./iso-image.nix
+ [ ./iso-image.nix
# Profiles of this basic installation CD.
../../profiles/all-hardware.nix
@@ -21,18 +20,6 @@ with lib;
isoImage.volumeID = substring 0 11 "NIXOS_ISO";
- # Make the installer more likely to succeed in low memory
- # environments. The kernel's overcommit heustistics bite us
- # fairly often, preventing processes such as nix-worker or
- # download-using-manifests.pl from forking even if there is
- # plenty of free memory.
- boot.kernel.sysctl."vm.overcommit_memory" = "1";
-
- # To speed up installation a little bit, include the complete stdenv
- # in the Nix store on the CD. Archive::Cpio is needed for the
- # initrd builder.
- isoImage.storeContents = [ pkgs.stdenv pkgs.busybox pkgs.perlPackages.ArchiveCpio ];
-
# EFI booting
isoImage.makeEfiBootable = true;
@@ -42,9 +29,6 @@ with lib;
# Add Memtest86+ to the CD.
boot.loader.grub.memtest86.enable = true;
- # Get a console as soon as the initrd loads fbcon on EFI boot.
- boot.initrd.kernelModules = [ "fbcon" ];
-
# Allow the user to log in as root without a password.
users.extraUsers.root.initialHashedPassword = "";
}
diff --git a/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix b/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix
index f34e789e28c..4641b8fcf9d 100644
--- a/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix
+++ b/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix
@@ -1,14 +1,11 @@
# This module defines a small NixOS installation CD. It does not
# contain any graphical stuff.
-{ config, pkgs, lib, ... }:
+{ config, lib, ... }:
{
imports =
[ ./installation-cd-base.nix
../../profiles/minimal.nix
];
-
- # Enable in installer, even if minimal profile disables it
- services.nixosManual.enable = lib.mkOverride 999 true;
}
diff --git a/nixos/modules/installer/tools/nixos-generate-config.pl b/nixos/modules/installer/tools/nixos-generate-config.pl
index ec3137ede4f..a929e1eb826 100644
--- a/nixos/modules/installer/tools/nixos-generate-config.pl
+++ b/nixos/modules/installer/tools/nixos-generate-config.pl
@@ -495,7 +495,7 @@ $bootLoaderConfig
# Select internationalisation properties.
# i18n = {
- # consoleFont = "lat9w-16";
+ # consoleFont = "Lat2-Terminus16";
# consoleKeyMap = "us";
# defaultLocale = "en_US.UTF-8";
# };
diff --git a/nixos/modules/misc/assertions.nix b/nixos/modules/misc/assertions.nix
index c1be36e98cb..c42de038e61 100644
--- a/nixos/modules/misc/assertions.nix
+++ b/nixos/modules/misc/assertions.nix
@@ -21,7 +21,7 @@ with lib;
warnings = mkOption {
internal = true;
default = [];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = [ "The `foo' service is deprecated and will go away soon!" ];
description = ''
This option allows modules to show warnings to users during
diff --git a/nixos/modules/misc/extra-arguments.nix b/nixos/modules/misc/extra-arguments.nix
index c2c8903546d..ff2ff7cd432 100644
--- a/nixos/modules/misc/extra-arguments.nix
+++ b/nixos/modules/misc/extra-arguments.nix
@@ -2,8 +2,6 @@
{
_module.args = {
- modulesPath = ../.;
-
pkgs_i686 = import ../../lib/nixpkgs.nix {
system = "i686-linux";
config.allowUnfree = true;
diff --git a/nixos/modules/misc/ids.nix b/nixos/modules/misc/ids.nix
index cc1976e236b..d283a633734 100644
--- a/nixos/modules/misc/ids.nix
+++ b/nixos/modules/misc/ids.nix
@@ -217,6 +217,9 @@
asterisk = 192;
plex = 193;
bird = 195;
+ grafana = 196;
+ skydns = 197;
+ ripple-rest = 198;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
@@ -412,6 +415,9 @@
plex = 193;
sabnzbd = 194;
bird = 195;
+ #grafana = 196; #unused
+ #skydns = 197; #unused
+ #ripple-rest = 198; #unused
# When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal
diff --git a/nixos/modules/misc/nixpkgs.nix b/nixos/modules/misc/nixpkgs.nix
index 114feb2562d..fb5516c953c 100644
--- a/nixos/modules/misc/nixpkgs.nix
+++ b/nixos/modules/misc/nixpkgs.nix
@@ -59,7 +59,7 @@ in
};
nixpkgs.system = mkOption {
- type = types.uniq types.str;
+ type = types.str;
example = "i686-linux";
description = ''
Specifies the Nix platform type for which NixOS should be built.
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix
index d7b8b34aefe..d33d3ca91d4 100644
--- a/nixos/modules/module-list.nix
+++ b/nixos/modules/module-list.nix
@@ -212,6 +212,7 @@
./services/misc/plex.nix
./services/misc/redmine.nix
./services/misc/rippled.nix
+ ./services/misc/ripple-rest.nix
./services/misc/ripple-data-api.nix
./services/misc/rogue.nix
./services/misc/siproxd.nix
@@ -225,6 +226,7 @@
./services/monitoring/collectd.nix
./services/monitoring/das_watchdog.nix
./services/monitoring/dd-agent.nix
+ ./services/monitoring/grafana.nix
./services/monitoring/graphite.nix
./services/monitoring/monit.nix
./services/monitoring/munin.nix
@@ -317,6 +319,7 @@
./services/networking/sabnzbd.nix
./services/networking/searx.nix
./services/networking/seeks.nix
+ ./services/networking/skydns.nix
./services/networking/spiped.nix
./services/networking/sslh.nix
./services/networking/ssh/lshd.nix
diff --git a/nixos/modules/profiles/installation-device.nix b/nixos/modules/profiles/installation-device.nix
index a41d17e5182..946032781f4 100644
--- a/nixos/modules/profiles/installation-device.nix
+++ b/nixos/modules/profiles/installation-device.nix
@@ -1,5 +1,5 @@
# Provide a basic configuration for installation devices like CDs.
-{ config, lib, ... }:
+{ config, pkgs, lib, ... }:
with lib;
@@ -13,10 +13,17 @@ with lib;
# Allow "nixos-rebuild" to work properly by providing
# /etc/nixos/configuration.nix.
./clone-config.nix
+
+ # Include a copy of Nixpkgs so that nixos-install works out of
+ # the box.
+ ../installer/cd-dvd/channel.nix
];
config = {
+ # Enable in installer, even if the minimal profile disables it.
+ services.nixosManual.enable = mkForce true;
+
# Show the manual.
services.nixosManual.showManual = true;
@@ -43,7 +50,7 @@ with lib;
systemd.services.sshd.wantedBy = mkOverride 50 [];
# Enable wpa_supplicant, but don't start it by default.
- networking.wireless.enable = true;
+ networking.wireless.enable = mkDefault true;
jobs.wpa_supplicant.startOn = mkOverride 50 "";
# Tell the Nix evaluator to garbage collect more aggressively.
@@ -51,5 +58,17 @@ with lib;
# (yet) have swap set up.
environment.variables.GC_INITIAL_HEAP_SIZE = "100000";
+ # Make the installer more likely to succeed in low memory
+ # environments. The kernel's overcommit heustistics bite us
+ # fairly often, preventing processes such as nix-worker or
+ # download-using-manifests.pl from forking even if there is
+ # plenty of free memory.
+ boot.kernel.sysctl."vm.overcommit_memory" = "1";
+
+ # To speed up installation a little bit, include the complete
+ # stdenv in the Nix store on the CD. Archive::Cpio is needed for
+ # the initrd builder.
+ system.extraDependencies = [ pkgs.stdenv pkgs.busybox pkgs.perlPackages.ArchiveCpio ];
+
};
}
diff --git a/nixos/modules/programs/ssh.nix b/nixos/modules/programs/ssh.nix
index 6ca73eea5f6..0d1ec500afc 100644
--- a/nixos/modules/programs/ssh.nix
+++ b/nixos/modules/programs/ssh.nix
@@ -27,7 +27,7 @@ in
programs.ssh = {
askPassword = mkOption {
- type = types.string;
+ type = types.str;
default = "${pkgs.x11_ssh_askpass}/libexec/x11-ssh-askpass";
description = ''Program used by SSH to ask for passwords.'';
};
@@ -77,7 +77,7 @@ in
};
agentTimeout = mkOption {
- type = types.nullOr types.string;
+ type = types.nullOr types.str;
default = null;
example = "1h";
description = ''
diff --git a/nixos/modules/security/ca.nix b/nixos/modules/security/ca.nix
index 595b9476fa5..88f53eab9b4 100644
--- a/nixos/modules/security/ca.nix
+++ b/nixos/modules/security/ca.nix
@@ -22,7 +22,7 @@ in
security.pki.certificateFiles = mkOption {
type = types.listOf types.path;
default = [];
- example = literalExample "[ \"\${pkgs.cacert}/ca-bundle.crt\" ]";
+ example = literalExample "[ \"\${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\" ]";
description = ''
A list of files containing trusted root certificates in PEM
format. These are concatenated to form
@@ -33,7 +33,7 @@ in
};
security.pki.certificates = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
example = singleton ''
NixOS.org
@@ -53,7 +53,7 @@ in
config = {
- security.pki.certificateFiles = [ "${pkgs.cacert}/ca-bundle.crt" ];
+ security.pki.certificateFiles = [ "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt" ];
# NixOS canonical location + Debian/Ubuntu/Arch/Gentoo compatibility.
environment.etc."ssl/certs/ca-certificates.crt".source = caBundle;
diff --git a/nixos/modules/services/audio/mpd.nix b/nixos/modules/services/audio/mpd.nix
index 06ba4b9b5ac..5515f827b29 100644
--- a/nixos/modules/services/audio/mpd.nix
+++ b/nixos/modules/services/audio/mpd.nix
@@ -118,7 +118,7 @@ in {
preStart = "mkdir -p ${cfg.dataDir} && chown -R ${cfg.user}:${cfg.group} ${cfg.dataDir}";
script = "exec mpd --no-daemon ${mpdConf}";
serviceConfig = {
- User = "mpd";
+ User = "${cfg.user}";
PermissionsStartOnly = true;
};
};
diff --git a/nixos/modules/services/backup/almir.nix b/nixos/modules/services/backup/almir.nix
index ec39a997028..fbb4ff4034f 100644
--- a/nixos/modules/services/backup/almir.nix
+++ b/nixos/modules/services/backup/almir.nix
@@ -95,7 +95,7 @@ in {
port = mkOption {
default = 35000;
- type = types.uniq types.int;
+ type = types.int;
description = ''
Port for Almir web server to listen on.
'';
diff --git a/nixos/modules/services/backup/bacula.nix b/nixos/modules/services/backup/bacula.nix
index c2255f68818..9e3ae66f808 100644
--- a/nixos/modules/services/backup/bacula.nix
+++ b/nixos/modules/services/backup/bacula.nix
@@ -182,7 +182,7 @@ in {
port = mkOption {
default = 9102;
- type = types.uniq types.int;
+ type = types.int;
description = ''
This specifies the port number on which the Client listens for Director connections. It must agree with the FDPort specified in the Client resource of the Director's configuration file. The default is 9102.
'';
@@ -237,7 +237,7 @@ in {
port = mkOption {
default = 9103;
- type = types.uniq types.int;
+ type = types.int;
description = ''
Specifies port number on which the Storage daemon listens for Director connections. The default is 9103.
'';
@@ -302,7 +302,7 @@ in {
port = mkOption {
default = 9101;
- type = types.uniq types.int;
+ type = types.int;
description = ''
Specify the port (a positive integer) on which the Director daemon will listen for Bacula Console connections. This same port number must be specified in the Director resource of the Console configuration file. The default is 9101, so normally this directive need not be specified. This directive should not be used if you specify DirAddresses (N.B plural) directive.
'';
diff --git a/nixos/modules/services/cluster/kubernetes.nix b/nixos/modules/services/cluster/kubernetes.nix
index 6a775bb159f..a7f4ec7b008 100644
--- a/nixos/modules/services/cluster/kubernetes.nix
+++ b/nixos/modules/services/cluster/kubernetes.nix
@@ -286,7 +286,7 @@ in {
clusterDomain = mkOption {
description = "Use alternative domain.";
- default = "";
+ default = "kubernetes.io";
type = types.str;
};
@@ -322,13 +322,35 @@ in {
type = types.str;
};
};
+
+ kube2sky = {
+ enable = mkEnableOption "Whether to enable kube2sky dns service.";
+
+ domain = mkOption {
+ description = "Kuberntes kube2sky domain under which all DNS names will be hosted.";
+ default = cfg.kubelet.clusterDomain;
+ type = types.str;
+ };
+
+ master = mkOption {
+ description = "Kubernetes apiserver address";
+ default = "${cfg.apiserver.address}:${toString cfg.apiserver.port}";
+ type = types.str;
+ };
+
+ extraOpts = mkOption {
+ description = "Kubernetes kube2sky extra command line options.";
+ default = "";
+ type = types.str;
+ };
+ };
};
###### implementation
config = mkMerge [
(mkIf cfg.apiserver.enable {
- systemd.services.kubernetes-apiserver = {
+ systemd.services.kube-apiserver = {
description = "Kubernetes Api Server";
wantedBy = [ "multi-user.target" ];
requires = ["kubernetes-setup.service"];
@@ -343,26 +365,25 @@ in {
(concatImapStringsSep "\n" (i: v: v + "," + (toString i))
(mapAttrsToList (name: token: token + "," + name) cfg.apiserver.tokenAuth));
in ''${cfg.package}/bin/kube-apiserver \
- --etcd_servers=${concatMapStringsSep "," (f: "http://${f}") cfg.etcdServers} \
- --address=${cfg.apiserver.address} \
- --port=${toString cfg.apiserver.port} \
- --read_only_port=${toString cfg.apiserver.readOnlyPort} \
- --public_address_override=${cfg.apiserver.publicAddress} \
- --allow_privileged=${if cfg.apiserver.allowPrivileged then "true" else "false"} \
+ --etcd-servers=${concatMapStringsSep "," (f: "http://${f}") cfg.etcdServers} \
+ --insecure-bind-address=${cfg.apiserver.address} \
+ --insecure-port=${toString cfg.apiserver.port} \
+ --read-only-port=${toString cfg.apiserver.readOnlyPort} \
+ --bind-address=${cfg.apiserver.publicAddress} \
+ --allow-privileged=${if cfg.apiserver.allowPrivileged then "true" else "false"} \
${optionalString (cfg.apiserver.tlsCertFile!="")
- "--tls_cert_file=${cfg.apiserver.tlsCertFile}"} \
+ "--tls-cert-file=${cfg.apiserver.tlsCertFile}"} \
${optionalString (cfg.apiserver.tlsPrivateKeyFile!="")
- "--tls_private_key_file=${cfg.apiserver.tlsPrivateKeyFile}"} \
+ "--tls-private-key-file=${cfg.apiserver.tlsPrivateKeyFile}"} \
${optionalString (cfg.apiserver.tokenAuth!=[])
- "--token_auth_file=${tokenAuthFile}"} \
- --authorization_mode=${cfg.apiserver.authorizationMode} \
+ "--token-auth-file=${tokenAuthFile}"} \
+ --authorization-mode=${cfg.apiserver.authorizationMode} \
${optionalString (cfg.apiserver.authorizationMode == "ABAC")
- "--authorization_policy_file=${authorizationPolicyFile}"} \
- --secure_port=${toString cfg.apiserver.securePort} \
- --portal_net=${cfg.apiserver.portalNet} \
+ "--authorization-policy-file=${authorizationPolicyFile}"} \
+ --secure-port=${toString cfg.apiserver.securePort} \
+ --service-cluster-ip-range=${cfg.apiserver.portalNet} \
--logtostderr=true \
- --runtime_config=api/v1beta3 \
- ${optionalString cfg.verbose "--v=6 --log_flush_frequency=1s"} \
+ ${optionalString cfg.verbose "--v=6 --log-flush-frequency=1s"} \
${cfg.apiserver.extraOpts}
'';
User = "kubernetes";
@@ -376,7 +397,7 @@ in {
})
(mkIf cfg.scheduler.enable {
- systemd.services.kubernetes-scheduler = {
+ systemd.services.kube-scheduler = {
description = "Kubernetes Scheduler Service";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "kubernetes-apiserver.service" ];
@@ -386,7 +407,7 @@ in {
--port=${toString cfg.scheduler.port} \
--master=${cfg.scheduler.master} \
--logtostderr=true \
- ${optionalString cfg.verbose "--v=6 --log_flush_frequency=1s"} \
+ ${optionalString cfg.verbose "--v=6 --log-flush-frequency=1s"} \
${cfg.scheduler.extraOpts}
'';
User = "kubernetes";
@@ -395,7 +416,7 @@ in {
})
(mkIf cfg.controllerManager.enable {
- systemd.services.kubernetes-controller-manager = {
+ systemd.services.kube-controller-manager = {
description = "Kubernetes Controller Manager Service";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "kubernetes-apiserver.service" ];
@@ -406,7 +427,7 @@ in {
--master=${cfg.controllerManager.master} \
--machines=${concatStringsSep "," cfg.controllerManager.machines} \
--logtostderr=true \
- ${optionalString cfg.verbose "--v=6 --log_flush_frequency=1s"} \
+ ${optionalString cfg.verbose "--v=6 --log-flush-frequency=1s"} \
${cfg.controllerManager.extraOpts}
'';
User = "kubernetes";
@@ -415,7 +436,7 @@ in {
})
(mkIf cfg.kubelet.enable {
- systemd.services.kubernetes-kubelet = {
+ systemd.services.kubelet = {
description = "Kubernetes Kubelet Service";
wantedBy = [ "multi-user.target" ];
requires = ["kubernetes-setup.service"];
@@ -423,17 +444,17 @@ in {
script = ''
export PATH="/bin:/sbin:/usr/bin:/usr/sbin:$PATH"
exec ${cfg.package}/bin/kubelet \
- --api_servers=${concatMapStringsSep "," (f: "http://${f}") cfg.kubelet.apiServers} \
+ --api-servers=${concatMapStringsSep "," (f: "http://${f}") cfg.kubelet.apiServers} \
--address=${cfg.kubelet.address} \
--port=${toString cfg.kubelet.port} \
- --hostname_override=${cfg.kubelet.hostname} \
- --allow_privileged=${if cfg.kubelet.allowPrivileged then "true" else "false"} \
- --root_dir=${cfg.dataDir} \
+ --hostname-override=${cfg.kubelet.hostname} \
+ --allow-privileged=${if cfg.kubelet.allowPrivileged then "true" else "false"} \
+ --root-dir=${cfg.dataDir} \
--cadvisor_port=${toString cfg.kubelet.cadvisorPort} \
${optionalString (cfg.kubelet.clusterDns != "")
- ''--cluster_dns=${cfg.kubelet.clusterDns}''} \
+ ''--cluster-dns=${cfg.kubelet.clusterDns}''} \
${optionalString (cfg.kubelet.clusterDomain != "")
- ''--cluster_domain=${cfg.kubelet.clusterDomain}''} \
+ ''--cluster-domain=${cfg.kubelet.clusterDomain}''} \
--logtostderr=true \
${optionalString cfg.verbose "--v=6 --log_flush_frequency=1s"} \
${cfg.kubelet.extraOpts}
@@ -443,26 +464,49 @@ in {
})
(mkIf cfg.proxy.enable {
- systemd.services.kubernetes-proxy = {
+ systemd.services.kube-proxy = {
description = "Kubernetes Proxy Service";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "etcd.service" ];
serviceConfig = {
ExecStart = ''${cfg.package}/bin/kube-proxy \
--master=${cfg.proxy.master} \
- --bind_address=${cfg.proxy.address} \
+ --bind-address=${cfg.proxy.address} \
--logtostderr=true \
- ${optionalString cfg.verbose "--v=6 --log_flush_frequency=1s"} \
+ ${optionalString cfg.verbose "--v=6 --log-flush-frequency=1s"} \
${cfg.proxy.extraOpts}
'';
};
};
})
+ (mkIf cfg.kube2sky.enable {
+ systemd.services.kube2sky = {
+ description = "Kubernetes Dns Bridge Service";
+ wantedBy = [ "multi-user.target" ];
+ after = [ "network.target" "skydns.service" "etcd.service" "kubernetes-apiserver.service" ];
+ serviceConfig = {
+ ExecStart = ''${cfg.package}/bin/kube2sky \
+ -etcd-server=http://${head cfg.etcdServers} \
+ -domain=${cfg.kube2sky.domain} \
+ -kube_master_url=http://${cfg.kube2sky.master} \
+ -logtostderr=true \
+ ${optionalString cfg.verbose "--v=6 --log-flush-frequency=1s"} \
+ ${cfg.kube2sky.extraOpts}
+ '';
+ User = "kubernetes";
+ };
+ };
+
+ services.skydns.enable = mkDefault true;
+ services.skydns.domain = mkDefault cfg.kubelet.clusterDomain;
+ })
+
(mkIf (any (el: el == "master") cfg.roles) {
services.kubernetes.apiserver.enable = mkDefault true;
services.kubernetes.scheduler.enable = mkDefault true;
services.kubernetes.controllerManager.enable = mkDefault true;
+ services.kubernetes.kube2sky.enable = mkDefault true;
})
(mkIf (any (el: el == "node") cfg.roles) {
diff --git a/nixos/modules/services/continuous-integration/jenkins/default.nix b/nixos/modules/services/continuous-integration/jenkins/default.nix
index 29a81f066ab..ccea85faa3e 100644
--- a/nixos/modules/services/continuous-integration/jenkins/default.nix
+++ b/nixos/modules/services/continuous-integration/jenkins/default.nix
@@ -50,7 +50,7 @@ in {
port = mkOption {
default = 8080;
- type = types.uniq types.int;
+ type = types.int;
description = ''
Specifies port number on which the jenkins HTTP interface listens. The default is 8080.
'';
diff --git a/nixos/modules/services/databases/influxdb.nix b/nixos/modules/services/databases/influxdb.nix
index b57ccebae16..08963f7aab7 100644
--- a/nixos/modules/services/databases/influxdb.nix
+++ b/nixos/modules/services/databases/influxdb.nix
@@ -55,7 +55,7 @@ in
enable = mkOption {
default = false;
description = "Whether to enable the influxdb server";
- type = types.uniq types.bool;
+ type = types.bool;
};
package = mkOption {
diff --git a/nixos/modules/services/databases/mysql.nix b/nixos/modules/services/databases/mysql.nix
index b5919047cc1..1cdecedfc77 100644
--- a/nixos/modules/services/databases/mysql.nix
+++ b/nixos/modules/services/databases/mysql.nix
@@ -180,7 +180,8 @@ in
chown -R ${cfg.user} ${cfg.pidDir}
# Make the socket directory
- mkdir -m 0755 -p /run/mysqld
+ mkdir -p /run/mysqld
+ chmod 0755 /run/mysqld
chown -R ${cfg.user} /run/mysqld
'';
diff --git a/nixos/modules/services/databases/neo4j.nix b/nixos/modules/services/databases/neo4j.nix
index 575034c93ab..3cf22db7da2 100644
--- a/nixos/modules/services/databases/neo4j.nix
+++ b/nixos/modules/services/databases/neo4j.nix
@@ -43,7 +43,7 @@ in {
enable = mkOption {
description = "Whether to enable neo4j.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
package = mkOption {
diff --git a/nixos/modules/services/logging/logcheck.nix b/nixos/modules/services/logging/logcheck.nix
index 1cd032ffa76..6069262b470 100644
--- a/nixos/modules/services/logging/logcheck.nix
+++ b/nixos/modules/services/logging/logcheck.nix
@@ -192,7 +192,7 @@ in
extraGroups = mkOption {
default = [];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = [ "postdrop" "mongodb" ];
description = ''
Extra groups for the logcheck user, for example to be able to use sendmail,
diff --git a/nixos/modules/services/logging/rsyslogd.nix b/nixos/modules/services/logging/rsyslogd.nix
index d4b7aa809f0..1ea96b8f132 100644
--- a/nixos/modules/services/logging/rsyslogd.nix
+++ b/nixos/modules/services/logging/rsyslogd.nix
@@ -66,7 +66,7 @@ in
};
extraParams = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [ ];
example = [ "-m 0" ];
description = ''
diff --git a/nixos/modules/services/logging/syslogd.nix b/nixos/modules/services/logging/syslogd.nix
index 325868079e2..a0f8e89fa69 100644
--- a/nixos/modules/services/logging/syslogd.nix
+++ b/nixos/modules/services/logging/syslogd.nix
@@ -83,7 +83,7 @@ in
};
extraParams = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [ ];
example = [ "-m 0" ];
description = ''
diff --git a/nixos/modules/services/mail/opensmtpd.nix b/nixos/modules/services/mail/opensmtpd.nix
index fbc4b1d7d8a..a3e50b42292 100644
--- a/nixos/modules/services/mail/opensmtpd.nix
+++ b/nixos/modules/services/mail/opensmtpd.nix
@@ -24,7 +24,7 @@ in {
};
extraServerArgs = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
example = [ "-v" "-P mta" ];
description = ''
diff --git a/nixos/modules/services/mail/postfix.nix b/nixos/modules/services/mail/postfix.nix
index 839da7407ef..24bcc6bb57c 100644
--- a/nixos/modules/services/mail/postfix.nix
+++ b/nixos/modules/services/mail/postfix.nix
@@ -380,6 +380,7 @@ in
${pkgs.coreutils}/bin/chmod -R ug+rwX /var/postfix/queue
${pkgs.coreutils}/bin/chown root:root /var/spool/mail
${pkgs.coreutils}/bin/chmod a+rwxt /var/spool/mail
+ ${pkgs.coreutils}/bin/ln -sf /var/spool/mail /var/mail
ln -sf "${pkgs.postfix}/share/postfix/conf/"* /var/postfix/conf
diff --git a/nixos/modules/services/misc/apache-kafka.nix b/nixos/modules/services/misc/apache-kafka.nix
index 90555ebc468..f6198e03bae 100644
--- a/nixos/modules/services/misc/apache-kafka.nix
+++ b/nixos/modules/services/misc/apache-kafka.nix
@@ -33,7 +33,7 @@ in {
enable = mkOption {
description = "Whether to enable Apache Kafka.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
brokerId = mkOption {
@@ -108,7 +108,7 @@ in {
"-Djava.awt.headless=true"
"-Djava.net.preferIPv4Stack=true"
];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = [
"-Djava.net.preferIPv4Stack=true"
"-Dcom.sun.management.jmxremote"
@@ -116,11 +116,19 @@ in {
];
};
+ package = mkOption {
+ description = "The kafka package to use";
+
+ default = pkgs.apacheKafka;
+
+ type = types.package;
+ };
+
};
config = mkIf cfg.enable {
- environment.systemPackages = [pkgs.apacheKafka];
+ environment.systemPackages = [cfg.package];
users.extraUsers = singleton {
name = "apache-kafka";
@@ -136,7 +144,7 @@ in {
serviceConfig = {
ExecStart = ''
${pkgs.jre}/bin/java \
- -cp "${pkgs.apacheKafka}/libs/*:${configDir}" \
+ -cp "${cfg.package}/libs/*:${configDir}" \
${toString cfg.jvmOptions} \
kafka.Kafka \
${configDir}/server.properties
diff --git a/nixos/modules/services/misc/disnix.nix b/nixos/modules/services/misc/disnix.nix
index 48bb9e4293e..c439efe9f8e 100644
--- a/nixos/modules/services/misc/disnix.nix
+++ b/nixos/modules/services/misc/disnix.nix
@@ -67,7 +67,7 @@ in
###### implementation
config = mkIf cfg.enable {
- environment.systemPackages = [ pkgs.disnix ] ++ optional cfg.useWebServiceInterface pkgs.DisnixWebService;
+ environment.systemPackages = [ pkgs.disnix pkgs.dysnomia ] ++ optional cfg.useWebServiceInterface pkgs.DisnixWebService;
services.dbus.enable = true;
services.dbus.packages = [ pkgs.disnix ];
diff --git a/nixos/modules/services/misc/docker-registry.nix b/nixos/modules/services/misc/docker-registry.nix
index d25fd13a77d..f472e530a70 100644
--- a/nixos/modules/services/misc/docker-registry.nix
+++ b/nixos/modules/services/misc/docker-registry.nix
@@ -29,7 +29,7 @@ in {
storagePath = mkOption {
type = types.path;
- default = "/var/lib/docker/registry";
+ default = "/var/lib/docker-registry";
description = "Docker registry storage path.";
};
@@ -61,14 +61,9 @@ in {
User = "docker-registry";
Group = "docker";
PermissionsStartOnly = true;
+ WorkingDirectory = cfg.storagePath;
};
- preStart = ''
- mkdir -p ${cfg.storagePath}
- if [ "$(id -u)" = 0 ]; then
- chown -R docker-registry:docker ${cfg.storagePath}
- fi
- '';
postStart = ''
until ${pkgs.curl}/bin/curl -s -o /dev/null 'http://${cfg.host}:${toString cfg.port}/'; do
sleep 1;
@@ -77,6 +72,10 @@ in {
};
users.extraGroups.docker.gid = mkDefault config.ids.gids.docker;
- users.extraUsers.docker-registry.uid = config.ids.uids.docker-registry;
+ users.extraUsers.docker-registry = {
+ createHome = true;
+ home = cfg.storagePath;
+ uid = config.ids.uids.docker-registry;
+ };
};
}
diff --git a/nixos/modules/services/misc/gpsd.nix b/nixos/modules/services/misc/gpsd.nix
index 4a677f33fa0..a4a4c7b5d93 100644
--- a/nixos/modules/services/misc/gpsd.nix
+++ b/nixos/modules/services/misc/gpsd.nix
@@ -54,7 +54,7 @@ in
};
port = mkOption {
- type = types.uniq types.int;
+ type = types.int;
default = 2947;
description = ''
The port where to listen for TCP connections.
@@ -62,7 +62,7 @@ in
};
debugLevel = mkOption {
- type = types.uniq types.int;
+ type = types.int;
default = 0;
description = ''
The debugging level.
diff --git a/nixos/modules/services/misc/mediatomb.nix b/nixos/modules/services/misc/mediatomb.nix
index 23227548039..40ec2831ff0 100644
--- a/nixos/modules/services/misc/mediatomb.nix
+++ b/nixos/modules/services/misc/mediatomb.nix
@@ -49,10 +49,10 @@ let
- /nix/store/cngbzn39vidd6jm4wgzxfafqll74ybfa-mediatomb-0.12.1/share/mediatomb/js/common.js
- /nix/store/cngbzn39vidd6jm4wgzxfafqll74ybfa-mediatomb-0.12.1/share/mediatomb/js/playlists.js
+ ${pkgs.mediatomb}/share/mediatomb/js/common.js
+ ${pkgs.mediatomb}/share/mediatomb/js/playlists.js
- /nix/store/cngbzn39vidd6jm4wgzxfafqll74ybfa-mediatomb-0.12.1/share/mediatomb/js/import.js
+ ${pkgs.mediatomb}/share/mediatomb/js/import.js
@@ -230,6 +230,13 @@ in {
'';
};
+ interface = mkOption {
+ default = "";
+ description = ''
+ A specific interface to bind to.
+ '';
+ };
+
uuid = mkOption {
default = "fdfc8a4e-a3ad-4c1d-b43d-a2eedb03a687";
description = ''
@@ -256,7 +263,7 @@ in {
after = [ "local-fs.target" "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ pkgs.mediatomb ];
- serviceConfig.ExecStart = "${pkgs.mediatomb}/bin/mediatomb -p ${toString cfg.port} ${if cfg.customCfg then "" else "-c ${mtConf}"} -m ${cfg.dataDir}";
+ serviceConfig.ExecStart = "${pkgs.mediatomb}/bin/mediatomb -p ${toString cfg.port} ${if cfg.interface!="" then "-e ${cfg.interface}" else ""} ${if cfg.customCfg then "" else "-c ${mtConf}"} -m ${cfg.dataDir}";
serviceConfig.User = "${cfg.user}";
};
diff --git a/nixos/modules/services/misc/mesos-master.nix b/nixos/modules/services/misc/mesos-master.nix
index 52f08c53b1d..497646b2b41 100644
--- a/nixos/modules/services/misc/mesos-master.nix
+++ b/nixos/modules/services/misc/mesos-master.nix
@@ -13,7 +13,7 @@ in {
enable = mkOption {
description = "Whether to enable the Mesos Master.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
port = mkOption {
@@ -45,7 +45,7 @@ in {
See https://mesos.apache.org/documentation/latest/configuration/
'';
default = [ "" ];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = [ "--credentials=VALUE" ];
};
diff --git a/nixos/modules/services/misc/mesos-slave.nix b/nixos/modules/services/misc/mesos-slave.nix
index 811aa812c8d..8c29734813a 100644
--- a/nixos/modules/services/misc/mesos-slave.nix
+++ b/nixos/modules/services/misc/mesos-slave.nix
@@ -21,7 +21,7 @@ in {
enable = mkOption {
description = "Whether to enable the Mesos Slave.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
ip = mkOption {
@@ -70,7 +70,7 @@ in {
See https://mesos.apache.org/documentation/latest/configuration/
'';
default = [ "" ];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = [ "--gc_delay=3days" ];
};
diff --git a/nixos/modules/services/misc/mwlib.nix b/nixos/modules/services/misc/mwlib.nix
index d02e1e021a7..a8edecff2a1 100644
--- a/nixos/modules/services/misc/mwlib.nix
+++ b/nixos/modules/services/misc/mwlib.nix
@@ -226,7 +226,7 @@ in
chmod -Rc u=rwX,go= '${cfg.nslave.cachedir}'
'';
- path = with pkgs; [ imagemagick ];
+ path = with pkgs; [ imagemagick pdftk ];
environment = {
PYTHONPATH = concatMapStringsSep ":"
(m: "${pypkgs.${m}}/lib/${python.libPrefix}/site-packages")
diff --git a/nixos/modules/services/misc/nix-daemon.nix b/nixos/modules/services/misc/nix-daemon.nix
index 42a9d46f1d6..6d25fef4576 100644
--- a/nixos/modules/services/misc/nix-daemon.nix
+++ b/nixos/modules/services/misc/nix-daemon.nix
@@ -63,7 +63,7 @@ in
package = mkOption {
type = types.package;
- default = pkgs.nixUnstable;
+ default = pkgs.nix;
description = ''
This option specifies the Nix package instance to use throughout the system.
'';
diff --git a/nixos/modules/services/misc/ripple-rest.nix b/nixos/modules/services/misc/ripple-rest.nix
new file mode 100644
index 00000000000..dc07ee132fa
--- /dev/null
+++ b/nixos/modules/services/misc/ripple-rest.nix
@@ -0,0 +1,110 @@
+{ config, pkgs, lib, ... }:
+
+with lib;
+
+let
+ cfg = config.services.rippleRest;
+
+ configFile = pkgs.writeText "ripple-rest-config.json" (builtins.toJSON {
+ config_version = "2.0.3";
+ debug = cfg.debug;
+ port = cfg.port;
+ host = cfg.host;
+ ssl_enabled = cfg.ssl.enable;
+ ssl = {
+ key_path = cfg.ssl.keyPath;
+ cert_path = cfg.ssl.certPath;
+ reject_unathorized = cfg.ssl.rejectUnathorized;
+ };
+ db_path = cfg.dbPath;
+ max_transaction_fee = cfg.maxTransactionFee;
+ rippled_servers = cfg.rippleds;
+ });
+
+in {
+ options.services.rippleRest = {
+ enable = mkEnableOption "Whether to enable ripple rest.";
+
+ debug = mkEnableOption "Wheter to enable debug for ripple-rest.";
+
+ host = mkOption {
+ description = "Ripple rest host.";
+ default = "localhost";
+ type = types.str;
+ };
+
+ port = mkOption {
+ description = "Ripple rest port.";
+ default = 5990;
+ type = types.int;
+ };
+
+ ssl = {
+ enable = mkEnableOption "Whether to enable ssl.";
+
+ keyPath = mkOption {
+ description = "Path to the ripple rest key file.";
+ default = null;
+ type = types.nullOr types.path;
+ };
+
+
+ certPath = mkOption {
+ description = "Path to the ripple rest cert file.";
+ default = null;
+ type = types.nullOr types.path;
+ };
+
+ rejectUnathorized = mkOption {
+ description = "Whether to reject unatohroized.";
+ default = true;
+ type = types.bool;
+ };
+ };
+
+ dbPath = mkOption {
+ description = "Ripple rest database path.";
+ default = "${cfg.dataDir}/ripple-rest.db";
+ type = types.path;
+ };
+
+ maxTransactionFee = mkOption {
+ description = "Ripple rest max transaction fee.";
+ default = 1000000;
+ type = types.int;
+ };
+
+ rippleds = mkOption {
+ description = "List of rippled servers.";
+ default = [
+ "wss://s1.ripple.com:443"
+ ];
+ type = types.listOf types.str;
+ };
+
+ dataDir = mkOption {
+ description = "Ripple rest data directory.";
+ default = "/var/lib/ripple-rest";
+ type = types.path;
+ };
+ };
+
+ config = mkIf (cfg.enable) {
+ systemd.services.ripple-rest = {
+ wantedBy = [ "multi-user.target"];
+ after = ["network.target" ];
+ environment.NODE_PATH="${pkgs.ripple-rest}/lib/node_modules/ripple-rest/node_modules";
+ serviceConfig = {
+ ExecStart = "${pkgs.nodejs}/bin/node ${pkgs.ripple-rest}/lib/node_modules/ripple-rest/server/server.js --config ${configFile}";
+ User = "ripple-rest";
+ };
+ };
+
+ users.extraUsers.postgres = {
+ name = "ripple-rest";
+ uid = config.ids.uids.ripple-rest;
+ createHome = true;
+ home = cfg.dataDir;
+ };
+ };
+}
diff --git a/nixos/modules/services/misc/rippled.nix b/nixos/modules/services/misc/rippled.nix
index 03fcc003a40..045330eb551 100644
--- a/nixos/modules/services/misc/rippled.nix
+++ b/nixos/modules/services/misc/rippled.nix
@@ -27,7 +27,7 @@ let
protocol=${concatStringsSep "," p.protocol}
${optionalString (p.user != "") "user=${p.user}"}
${optionalString (p.password != "") "user=${p.password}"}
- admin=${if p.admin then "allow" else "no"}
+ admin=${concatStringsSep "," p.admin}
${optionalString (p.ssl.key != null) "ssl_key=${p.ssl.key}"}
${optionalString (p.ssl.cert != null) "ssl_cert=${p.ssl.cert}"}
${optionalString (p.ssl.chain != null) "ssl_chain=${p.ssl.chain}"}
@@ -118,9 +118,9 @@ let
};
admin = mkOption {
- description = "Controls whether or not administrative commands are allowed.";
- type = types.bool;
- default = false;
+ description = "A comma-separated list of admin IP addresses.";
+ type = types.listOf types.str;
+ default = ["127.0.0.1"];
};
ssl = {
@@ -156,7 +156,7 @@ let
dbOptions = {
type = mkOption {
description = "Rippled database type.";
- type = types.enum ["rocksdb" "nudb" "sqlite" "hyperleveldb"];
+ type = types.enum ["rocksdb" "nudb"];
default = "rocksdb";
};
@@ -217,7 +217,7 @@ in
default = {
rpc = {
port = 5005;
- admin = true;
+ admin = ["127.0.0.1"];
protocol = ["http"];
};
diff --git a/nixos/modules/services/misc/zookeeper.nix b/nixos/modules/services/misc/zookeeper.nix
index 47675b8876c..4ce692b6f6a 100644
--- a/nixos/modules/services/misc/zookeeper.nix
+++ b/nixos/modules/services/misc/zookeeper.nix
@@ -27,7 +27,7 @@ in {
enable = mkOption {
description = "Whether to enable Zookeeper.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
port = mkOption {
@@ -94,7 +94,7 @@ in {
extraCmdLineOptions = mkOption {
description = "Extra command line options for the Zookeeper launcher.";
default = [ "-Dcom.sun.management.jmxremote" "-Dcom.sun.management.jmxremote.local.only=true" ];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = [ "-Djava.net.preferIPv4Stack=true" "-Dcom.sun.management.jmxremote" "-Dcom.sun.management.jmxremote.local.only=true" ];
};
diff --git a/nixos/modules/services/monitoring/apcupsd.nix b/nixos/modules/services/monitoring/apcupsd.nix
index 6cd0254dbe3..9abd6e9ab64 100644
--- a/nixos/modules/services/monitoring/apcupsd.nix
+++ b/nixos/modules/services/monitoring/apcupsd.nix
@@ -74,7 +74,7 @@ in
enable = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
Whether to enable the APC UPS daemon. apcupsd monitors your UPS and
permits orderly shutdown of your computer in the event of a power
diff --git a/nixos/modules/services/monitoring/dd-agent.nix b/nixos/modules/services/monitoring/dd-agent.nix
index dc51a7c7486..3e90393a662 100644
--- a/nixos/modules/services/monitoring/dd-agent.nix
+++ b/nixos/modules/services/monitoring/dd-agent.nix
@@ -23,6 +23,7 @@ let
# proxy_password: password
# tags: mytag0, mytag1
+ ${optionalString (cfg.tags != null ) "tags: ${concatStringsSep "," cfg.tags }"}
# collect_ec2_tags: no
# recent_point_threshold: 30
@@ -80,6 +81,13 @@ in {
type = types.str;
};
+ tags = mkOption {
+ description = "The tags to mark this Datadog agent";
+ example = [ "test" "service" ];
+ default = null;
+ type = types.nullOr (types.listOf types.str);
+ };
+
hostname = mkOption {
description = "The hostname to show in the Datadog dashboard (optional)";
default = null;
diff --git a/nixos/modules/services/monitoring/grafana.nix b/nixos/modules/services/monitoring/grafana.nix
new file mode 100644
index 00000000000..ef0cc68a535
--- /dev/null
+++ b/nixos/modules/services/monitoring/grafana.nix
@@ -0,0 +1,335 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+ cfg = config.services.grafana;
+
+ b2s = val: if val then "true" else "false";
+
+ cfgFile = pkgs.writeText "grafana.ini" ''
+ app_name = grafana
+ app_mode = production
+
+ [server]
+ ; protocol (http or https)
+ protocol = ${cfg.protocol}
+ ; the ip address to bind to, empty will bind to all interfaces
+ http_addr = ${cfg.addr}
+ ; the http port to use
+ http_port = ${toString cfg.port}
+ ; The public facing domain name used to access grafana from a browser
+ domain = ${cfg.domain}
+ ; the full public facing url
+ root_url = ${cfg.rootUrl}
+ router_logging = false
+ ; the path relative to the binary where the static (html/js/css) files are placed
+ static_root_path = ${cfg.staticRootPath}
+ ; enable gzip
+ enable_gzip = false
+ ; https certs & key file
+ cert_file = ${cfg.certFile}
+ cert_key = ${cfg.certKey}
+
+ [analytics]
+ # Server reporting, sends usage counters to stats.grafana.org every 24 hours.
+ # No ip addresses are being tracked, only simple counters to track
+ # running instances, dashboard and error counts. It is very helpful to us.
+ # Change this option to false to disable reporting.
+ reporting_enabled = true
+ ; Google Analytics universal tracking code, only enabled if you specify an id here
+ google_analytics_ua_id =
+
+ [database]
+ ; Either "mysql", "postgres" or "sqlite3", it's your choice
+ type = ${cfg.database.type}
+ host = ${cfg.database.host}
+ name = ${cfg.database.name}
+ user = ${cfg.database.user}
+ password = ${cfg.database.password}
+ ; For "postgres" only, either "disable", "require" or "verify-full"
+ ssl_mode = disable
+ ; For "sqlite3" only
+ path = ${cfg.database.path}
+
+ [session]
+ ; Either "memory", "file", "redis", "mysql", default is "memory"
+ provider = file
+ ; Provider config options
+ ; memory: not have any config yet
+ ; file: session file path, e.g. `data/sessions`
+ ; redis: config like redis server addr, poolSize, password, e.g. `127.0.0.1:6379,100,grafana`
+ ; mysql: go-sql-driver/mysql dsn config string, e.g. `user:password@tcp(127.0.0.1)/database_name`
+ provider_config = data/sessions
+ ; Session cookie name
+ cookie_name = grafana_sess
+ ; If you use session in https only, default is false
+ cookie_secure = false
+ ; Session life time, default is 86400
+ session_life_time = 86400
+ ; session id hash func, Either "sha1", "sha256" or "md5" default is sha1
+ session_id_hashfunc = sha1
+ ; Session hash key, default is use random string
+ session_id_hashkey =
+
+ [security]
+ ; default admin user, created on startup
+ admin_user = ${cfg.security.adminUser}
+ ; default admin password, can be changed before first start of grafana, or in profile settings
+ admin_password = ${cfg.security.adminPassword}
+ ; used for signing
+ secret_key = ${cfg.security.secretKey}
+ ; Auto-login remember days
+ login_remember_days = 7
+ cookie_username = grafana_user
+ cookie_remember_name = grafana_remember
+
+ [users]
+ ; disable user signup / registration
+ allow_sign_up = ${b2s cfg.users.allowSignUp}
+ ; Allow non admin users to create organizations
+ allow_org_create = ${b2s cfg.users.allowOrgCreate}
+ # Set to true to automatically assign new users to the default organization (id 1)
+ auto_assign_org = ${b2s cfg.users.autoAssignOrg}
+ ; Default role new users will be automatically assigned (if disabled above is set to true)
+ auto_assign_org_role = ${cfg.users.autoAssignOrgRole}
+
+ [auth.anonymous]
+ ; enable anonymous access
+ enabled = ${b2s cfg.auth.anonymous.enable}
+ ; specify organization name that should be used for unauthenticated users
+ org_name = Main Org.
+ ; specify role for unauthenticated users
+ org_role = Viewer
+
+ [auth.github]
+ enabled = false
+ client_id = some_id
+ client_secret = some_secret
+ scopes = user:email
+ auth_url = https://github.com/login/oauth/authorize
+ token_url = https://github.com/login/oauth/access_token
+
+ [auth.google]
+ enabled = false
+ client_id = some_client_id
+ client_secret = some_client_secret
+ scopes = https://www.googleapis.com/auth/userinfo.profile https://www.googleapis.com/auth/userinfo.email
+ auth_url = https://accounts.google.com/o/oauth2/auth
+ token_url = https://accounts.google.com/o/oauth2/token
+
+ [log]
+ root_path = data/log
+ ; Either "console", "file", default is "console"
+ ; Use comma to separate multiple modes, e.g. "console, file"
+ mode = console
+ ; Buffer length of channel, keep it as it is if you don't know what it is.
+ buffer_len = 10000
+ ; Either "Trace", "Debug", "Info", "Warn", "Error", "Critical", default is "Trace"
+ level = Info
+
+ ; For "console" mode only
+ [log.console]
+ level =
+
+ ; For "file" mode only
+ [log.file]
+ level =
+ ; This enables automated log rotate(switch of following options), default is true
+ log_rotate = true
+ ; Max line number of single file, default is 1000000
+ max_lines = 1000000
+ ; Max size shift of single file, default is 28 means 1 << 28, 256MB
+ max_lines_shift = 28
+ ; Segment log daily, default is true
+ daily_rotate = true
+ ; Expired days of log file(delete after max days), default is 7
+ max_days = 7
+
+ [event_publisher]
+ enabled = false
+ rabbitmq_url = amqp://localhost/
+ exchange = grafana_events
+ '';
+
+in {
+ options.services.grafana = {
+ enable = mkEnableOption "Whether to enable grafana.";
+
+ protocol = mkOption {
+ description = "Which protocol to listen.";
+ default = "http";
+ type = types.enum ["http" "https"];
+ };
+
+ addr = mkOption {
+ description = "Listening address.";
+ default = "127.0.0.1";
+ type = types.str;
+ };
+
+ port = mkOption {
+ description = "Listening port.";
+ default = 3000;
+ type = types.int;
+ };
+
+ domain = mkOption {
+ description = "The public facing domain name used to access grafana from a browser.";
+ default = "localhost";
+ type = types.str;
+ };
+
+ rootUrl = mkOption {
+ description = "Full public facing url.";
+ default = "%(protocol)s://%(domain)s:%(http_port)s/";
+ type = types.str;
+ };
+
+ certFile = mkOption {
+ description = "Cert file for ssl.";
+ default = "";
+ type = types.str;
+ };
+
+ certKey = mkOption {
+ description = "Cert key for ssl.";
+ default = "";
+ type = types.str;
+ };
+
+ staticRootPath = mkOption {
+ description = "Root path for static assets.";
+ default = "${cfg.package}/share/go/src/github.com/grafana/grafana/public";
+ type = types.str;
+ };
+
+ package = mkOption {
+ description = "Package to use.";
+ default = pkgs.goPackages.grafana;
+ type = types.package;
+ };
+
+ dataDir = mkOption {
+ description = "Data directory.";
+ default = "/var/lib/grafana";
+ type = types.path;
+ };
+
+ database = {
+ type = mkOption {
+ description = "Database type.";
+ default = "sqlite3";
+ type = types.enum ["mysql" "sqlite3" "postgresql"];
+ };
+
+ host = mkOption {
+ description = "Database host.";
+ default = "127.0.0.1:3306";
+ type = types.str;
+ };
+
+ name = mkOption {
+ description = "Database name.";
+ default = "grafana";
+ type = types.str;
+ };
+
+ user = mkOption {
+ description = "Database user.";
+ default = "root";
+ type = types.str;
+ };
+
+ password = mkOption {
+ description = "Database password.";
+ default = "";
+ type = types.str;
+ };
+
+ path = mkOption {
+ description = "Database path.";
+ default = "${cfg.dataDir}/data/grafana.db";
+ type = types.path;
+ };
+ };
+
+ security = {
+ adminUser = mkOption {
+ description = "Default admin username.";
+ default = "admin";
+ type = types.str;
+ };
+
+ adminPassword = mkOption {
+ description = "Default admin password.";
+ default = "admin";
+ type = types.str;
+ };
+
+ secretKey = mkOption {
+ description = "Secret key used for signing.";
+ default = "SW2YcwTIb9zpOOhoPsMm";
+ type = types.str;
+ };
+ };
+
+ users = {
+ allowSignUp = mkOption {
+ description = "Disable user signup / registration";
+ default = false;
+ type = types.bool;
+ };
+
+ allowOrgCreate = mkOption {
+ description = "Whether user is allowed to create organizations.";
+ default = false;
+ type = types.bool;
+ };
+
+ autoAssignOrg = mkOption {
+ description = "Whether to automatically assign new users to default org.";
+ default = true;
+ type = types.bool;
+ };
+
+ autoAssignOrgRole = mkOption {
+ description = "Default role new users will be auto assigned.";
+ default = "Viewer";
+ type = types.enum ["Viewer" "Editor"];
+ };
+ };
+
+ auth.anonymous = {
+ enable = mkOption {
+ description = "Whether to allow anonymous access";
+ default = false;
+ type = types.bool;
+ };
+ };
+ };
+
+ config = mkIf cfg.enable {
+ warnings = [
+ "Grafana passwords will be stored as plaintext in nix store!"
+ ];
+
+ systemd.services.grafana = {
+ description = "Grafana Service Daemon";
+ wantedBy = ["multi-user.target"];
+ after = ["networking.target"];
+ serviceConfig = {
+ ExecStart = "${cfg.package}/bin/grafana --config ${cfgFile} web";
+ WorkingDirectory = cfg.dataDir;
+ User = "grafana";
+ };
+ };
+
+ users.extraUsers.grafana = {
+ uid = config.ids.uids.grafana;
+ description = "Grafana user";
+ home = cfg.dataDir;
+ createHome = true;
+ };
+ };
+}
diff --git a/nixos/modules/services/monitoring/graphite.nix b/nixos/modules/services/monitoring/graphite.nix
index bbbbcbccb9b..fb30daba1dc 100644
--- a/nixos/modules/services/monitoring/graphite.nix
+++ b/nixos/modules/services/monitoring/graphite.nix
@@ -67,7 +67,7 @@ in {
enable = mkOption {
description = "Whether to enable graphite web frontend.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
host = mkOption {
@@ -95,7 +95,7 @@ in {
'';
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
finders = mkOption {
@@ -177,7 +177,7 @@ in {
enableCache = mkOption {
description = "Whether to enable carbon cache, the graphite storage daemon.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
storageAggregation = mkOption {
@@ -234,7 +234,7 @@ in {
enableRelay = mkOption {
description = "Whether to enable carbon relay, the carbon replication and sharding service.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
relayRules = mkOption {
@@ -251,7 +251,7 @@ in {
enableAggregator = mkOption {
description = "Whether to enable carbon agregator, the carbon buffering service.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
aggregationRules = mkOption {
@@ -269,7 +269,7 @@ in {
enable = mkOption {
description = "Whether to enable seyren service.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
port = mkOption {
@@ -319,7 +319,7 @@ in {
'';
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
redisUrl = mkOption {
@@ -354,6 +354,16 @@ in {
type = types.lines;
};
};
+
+ beacon = {
+ enable = mkEnableOption "Whether to enable graphite beacon.";
+
+ config = mkOption {
+ description = "Graphite beacon configuration.";
+ default = {};
+ type = types.attrs;
+ };
+ };
};
###### implementation
@@ -535,10 +545,25 @@ in {
environment.systemPackages = [ pkgs.pythonPackages.graphite_pager ];
})
+ (mkIf cfg.beacon.enable {
+ systemd.services.graphite-beacon = {
+ description = "Grpahite Beacon Alerting Daemon";
+ wantedBy = [ "multi-user.target" ];
+ serviceConfig = {
+ ExecStart = ''
+ ${pkgs.pythonPackages.graphite_beacon}/bin/graphite-beacon \
+ --config ${pkgs.writeText "graphite-beacon.json" (builtins.toJSON cfg.beacon.config)}
+ '';
+ User = "graphite";
+ Group = "graphite";
+ };
+ };
+ })
+
(mkIf (
cfg.carbon.enableCache || cfg.carbon.enableAggregator || cfg.carbon.enableRelay ||
cfg.web.enable || cfg.api.enable ||
- cfg.seyren.enable || cfg.pager.enable
+ cfg.seyren.enable || cfg.pager.enable || cfg.beacon.enable
) {
users.extraUsers = singleton {
name = "graphite";
diff --git a/nixos/modules/services/monitoring/scollector.nix b/nixos/modules/services/monitoring/scollector.nix
index 0143d2e327b..179c587431e 100644
--- a/nixos/modules/services/monitoring/scollector.nix
+++ b/nixos/modules/services/monitoring/scollector.nix
@@ -73,7 +73,7 @@ in {
};
collectors = mkOption {
- type = types.attrs;
+ type = with types; attrsOf (listOf path);
default = {};
example = literalExample "{ 0 = [ \"\${postgresStats}/bin/collect-stats\" ]; }";
description = ''
diff --git a/nixos/modules/services/monitoring/statsd.nix b/nixos/modules/services/monitoring/statsd.nix
index 7d7ca27bb2f..d9e0b83e238 100644
--- a/nixos/modules/services/monitoring/statsd.nix
+++ b/nixos/modules/services/monitoring/statsd.nix
@@ -37,7 +37,7 @@ in
enable = mkOption {
description = "Whether to enable statsd stats aggregation service";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
host = mkOption {
@@ -49,7 +49,7 @@ in
port = mkOption {
description = "Port that stats listens for messages on over UDP";
default = 8125;
- type = types.uniq types.int;
+ type = types.int;
};
mgmt_address = mkOption {
@@ -61,7 +61,7 @@ in
mgmt_port = mkOption {
description = "Port to run the management TCP interface on";
default = 8126;
- type = types.uniq types.int;
+ type = types.int;
};
backends = mkOption {
diff --git a/nixos/modules/services/monitoring/ups.nix b/nixos/modules/services/monitoring/ups.nix
index cc9026f768a..eb478f7da65 100644
--- a/nixos/modules/services/monitoring/ups.nix
+++ b/nixos/modules/services/monitoring/ups.nix
@@ -32,7 +32,7 @@ let
shutdownOrder = mkOption {
default = 0;
- type = types.uniq types.int;
+ type = types.int;
description = ''
When you have multiple UPSes on your system, you usually need to
turn them off in a certain order. upsdrvctl shuts down all the
@@ -63,7 +63,7 @@ let
directives = mkOption {
default = [];
- type = types.listOf types.string;
+ type = types.listOf types.str;
description = ''
List of configuration directives for this UPS.
'';
@@ -151,7 +151,7 @@ in
maxStartDelay = mkOption {
default = 45;
- type = types.uniq types.int;
+ type = types.int;
description = ''
This can be set as a global variable above your first UPS
definition and it can also be set in a UPS section. This value
diff --git a/nixos/modules/services/network-filesystems/samba.nix b/nixos/modules/services/network-filesystems/samba.nix
index 8b3741bca0a..bbf21634c36 100644
--- a/nixos/modules/services/network-filesystems/samba.nix
+++ b/nixos/modules/services/network-filesystems/samba.nix
@@ -137,7 +137,7 @@ in
nsswins = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
Whether to enable the WINS NSS (Name Service Switch) plug-in.
Enabling it allows applications to resolve WINS/NetBIOS names (a.k.a.
diff --git a/nixos/modules/services/networking/atftpd.nix b/nixos/modules/services/networking/atftpd.nix
index 47465ba948a..d875ddc6352 100644
--- a/nixos/modules/services/networking/atftpd.nix
+++ b/nixos/modules/services/networking/atftpd.nix
@@ -18,7 +18,7 @@ in
enable = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
Whenever to enable the atftpd TFTP server.
'';
@@ -26,7 +26,7 @@ in
root = mkOption {
default = "/var/empty";
- type = types.uniq types.string;
+ type = types.str;
description = ''
Document root directory for the atftpd.
'';
diff --git a/nixos/modules/services/networking/btsync.nix b/nixos/modules/services/networking/btsync.nix
index d0123b79e3f..bd7a5bcebe6 100644
--- a/nixos/modules/services/networking/btsync.nix
+++ b/nixos/modules/services/networking/btsync.nix
@@ -208,8 +208,8 @@ in
storagePath = mkOption {
type = types.path;
- default = "/var/lib/btsync";
- example = "/var/lib/btsync";
+ default = "/var/lib/btsync/";
+ example = "/var/lib/btsync/";
description = ''
Where to store the bittorrent sync files.
'';
diff --git a/nixos/modules/services/networking/consul.nix b/nixos/modules/services/networking/consul.nix
index 53a9f462625..31bae628050 100644
--- a/nixos/modules/services/networking/consul.nix
+++ b/nixos/modules/services/networking/consul.nix
@@ -106,6 +106,12 @@ in
alerts = {
enable = mkEnableOption "Whether to enable consul-alerts";
+ package = mkOption {
+ description = "Package to use for consul-alerts.";
+ default = pkgs.consul-alerts;
+ type = types.package;
+ };
+
listenAddr = mkOption {
description = "Api listening address.";
default = "localhost:9000";
@@ -135,96 +141,101 @@ in
};
- config = mkIf cfg.enable {
+ config = mkIf cfg.enable (
+ mkMerge [{
- users.extraUsers."consul" = {
- description = "Consul agent daemon user";
- uid = config.ids.uids.consul;
- # The shell is needed for health checks
- shell = "/run/current-system/sw/bin/bash";
- };
-
- environment = {
- etc."consul.json".text = builtins.toJSON configOptions;
- # We need consul.d to exist for consul to start
- etc."consul.d/dummy.json".text = "{ }";
- systemPackages = with pkgs; [ consul ];
- };
-
- systemd.services.consul = {
- wantedBy = [ "multi-user.target" ];
- after = [ "network.target" ] ++ systemdDevices;
- bindsTo = systemdDevices;
- restartTriggers = [ config.environment.etc."consul.json".source ]
- ++ mapAttrsToList (_: d: d.source)
- (filterAttrs (n: _: hasPrefix "consul.d/" n) config.environment.etc);
-
- serviceConfig = {
- ExecStart = "@${pkgs.consul}/bin/consul consul agent -config-dir /etc/consul.d"
- + concatMapStrings (n: " -config-file ${n}") configFiles;
- ExecReload = "${pkgs.consul}/bin/consul reload";
- PermissionsStartOnly = true;
- User = if cfg.dropPrivileges then "consul" else null;
- TimeoutStartSec = "0";
- } // (optionalAttrs (cfg.leaveOnStop) {
- ExecStop = "${pkgs.consul}/bin/consul leave";
- });
-
- path = with pkgs; [ iproute gnugrep gawk consul ];
- preStart = ''
- mkdir -m 0700 -p ${dataDir}
- chown -R consul ${dataDir}
-
- # Determine interface addresses
- getAddrOnce () {
- ip addr show dev "$1" \
- | grep 'inet${optionalString (cfg.forceIpv4) " "}.*scope global' \
- | awk -F '[ /\t]*' '{print $3}' | head -n 1
- }
- getAddr () {
- ADDR="$(getAddrOnce $1)"
- LEFT=60 # Die after 1 minute
- while [ -z "$ADDR" ]; do
- sleep 1
- LEFT=$(expr $LEFT - 1)
- if [ "$LEFT" -eq "0" ]; then
- echo "Address lookup timed out"
- exit 1
- fi
- ADDR="$(getAddrOnce $1)"
- done
- echo "$ADDR"
- }
- echo "{" > /etc/consul-addrs.json
- delim=" "
- ''
- + concatStrings (flip mapAttrsToList cfg.interface (name: i:
- optionalString (i != null) ''
- echo "$delim \"${name}_addr\": \"$(getAddr "${i}")\"" >> /etc/consul-addrs.json
- delim=","
- ''))
- + ''
- echo "}" >> /etc/consul-addrs.json
- '';
- };
-
- systemd.services.consul-alerts = mkIf (cfg.alerts.enable) {
- wantedBy = [ "multi-user.target" ];
- after = [ "consul.service" ];
-
- path = [ pkgs.consul ];
-
- serviceConfig = {
- ExecStart = ''
- ${pkgs.consul-alerts}/bin/consul-alerts start \
- --alert-addr=${cfg.alerts.listenAddr} \
- --consul-addr=${cfg.alerts.consulAddr} \
- ${optionalString cfg.alerts.watchChecks "--watch-checks"} \
- ${optionalString cfg.alerts.watchEvents "--watch-events"}
- '';
- User = if cfg.dropPrivileges then "consul" else null;
+ users.extraUsers."consul" = {
+ description = "Consul agent daemon user";
+ uid = config.ids.uids.consul;
+ # The shell is needed for health checks
+ shell = "/run/current-system/sw/bin/bash";
};
- };
- };
+ environment = {
+ etc."consul.json".text = builtins.toJSON configOptions;
+ # We need consul.d to exist for consul to start
+ etc."consul.d/dummy.json".text = "{ }";
+ systemPackages = with pkgs; [ consul ];
+ };
+
+ systemd.services.consul = {
+ wantedBy = [ "multi-user.target" ];
+ after = [ "network.target" ] ++ systemdDevices;
+ bindsTo = systemdDevices;
+ restartTriggers = [ config.environment.etc."consul.json".source ]
+ ++ mapAttrsToList (_: d: d.source)
+ (filterAttrs (n: _: hasPrefix "consul.d/" n) config.environment.etc);
+
+ serviceConfig = {
+ ExecStart = "@${pkgs.consul}/bin/consul consul agent -config-dir /etc/consul.d"
+ + concatMapStrings (n: " -config-file ${n}") configFiles;
+ ExecReload = "${pkgs.consul}/bin/consul reload";
+ PermissionsStartOnly = true;
+ User = if cfg.dropPrivileges then "consul" else null;
+ TimeoutStartSec = "0";
+ } // (optionalAttrs (cfg.leaveOnStop) {
+ ExecStop = "${pkgs.consul}/bin/consul leave";
+ });
+
+ path = with pkgs; [ iproute gnugrep gawk consul ];
+ preStart = ''
+ mkdir -m 0700 -p ${dataDir}
+ chown -R consul ${dataDir}
+
+ # Determine interface addresses
+ getAddrOnce () {
+ ip addr show dev "$1" \
+ | grep 'inet${optionalString (cfg.forceIpv4) " "}.*scope global' \
+ | awk -F '[ /\t]*' '{print $3}' | head -n 1
+ }
+ getAddr () {
+ ADDR="$(getAddrOnce $1)"
+ LEFT=60 # Die after 1 minute
+ while [ -z "$ADDR" ]; do
+ sleep 1
+ LEFT=$(expr $LEFT - 1)
+ if [ "$LEFT" -eq "0" ]; then
+ echo "Address lookup timed out"
+ exit 1
+ fi
+ ADDR="$(getAddrOnce $1)"
+ done
+ echo "$ADDR"
+ }
+ echo "{" > /etc/consul-addrs.json
+ delim=" "
+ ''
+ + concatStrings (flip mapAttrsToList cfg.interface (name: i:
+ optionalString (i != null) ''
+ echo "$delim \"${name}_addr\": \"$(getAddr "${i}")\"" >> /etc/consul-addrs.json
+ delim=","
+ ''))
+ + ''
+ echo "}" >> /etc/consul-addrs.json
+ '';
+ };
+ }
+
+ (mkIf (cfg.alerts.enable) {
+ systemd.services.consul-alerts = {
+ wantedBy = [ "multi-user.target" ];
+ after = [ "consul.service" ];
+
+ path = [ pkgs.consul ];
+
+ serviceConfig = {
+ ExecStart = ''
+ ${cfg.alerts.package}/bin/consul-alerts start \
+ --alert-addr=${cfg.alerts.listenAddr} \
+ --consul-addr=${cfg.alerts.consulAddr} \
+ ${optionalString cfg.alerts.watchChecks "--watch-checks"} \
+ ${optionalString cfg.alerts.watchEvents "--watch-events"}
+ '';
+ User = if cfg.dropPrivileges then "consul" else null;
+ Restart = "on-failure";
+ };
+ };
+ })
+
+ ]);
}
diff --git a/nixos/modules/services/networking/dnsmasq.nix b/nixos/modules/services/networking/dnsmasq.nix
index 18086154b6b..4a812167bb5 100644
--- a/nixos/modules/services/networking/dnsmasq.nix
+++ b/nixos/modules/services/networking/dnsmasq.nix
@@ -45,7 +45,7 @@ in
};
servers = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
example = [ "8.8.8.8" "8.8.4.4" ];
description = ''
diff --git a/nixos/modules/services/networking/firewall.nix b/nixos/modules/services/networking/firewall.nix
index b05a640e11f..40681f5b957 100644
--- a/nixos/modules/services/networking/firewall.nix
+++ b/nixos/modules/services/networking/firewall.nix
@@ -287,7 +287,7 @@ in
};
networking.firewall.trustedInterfaces = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
description =
''
Traffic coming in from these interfaces will be accepted
@@ -379,7 +379,7 @@ in
networking.firewall.connectionTrackingModules = mkOption {
default = [ "ftp" ];
example = [ "ftp" "irc" "sane" "sip" "tftp" "amanda" "h323" "netbios_sn" "pptp" "snmp" ];
- type = types.listOf types.string;
+ type = types.listOf types.str;
description =
''
List of connection-tracking helpers that are auto-loaded.
diff --git a/nixos/modules/services/networking/freenet.nix b/nixos/modules/services/networking/freenet.nix
index e9cacf4a16e..3903a2c708c 100644
--- a/nixos/modules/services/networking/freenet.nix
+++ b/nixos/modules/services/networking/freenet.nix
@@ -20,13 +20,13 @@ in
services.freenet = {
enable = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = "Enable the Freenet daemon";
};
nice = mkOption {
- type = types.uniq types.int;
+ type = types.int;
default = 10;
description = "Set the nice level for the Freenet daemon";
};
diff --git a/nixos/modules/services/networking/iodined.nix b/nixos/modules/services/networking/iodined.nix
index bc0fbb42c99..6bfe62e6261 100644
--- a/nixos/modules/services/networking/iodined.nix
+++ b/nixos/modules/services/networking/iodined.nix
@@ -20,13 +20,13 @@ in
services.iodined = {
enable = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = "Enable iodine, ip over dns daemon";
};
client = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = "Start iodine in client mode";
};
diff --git a/nixos/modules/services/networking/kippo.nix b/nixos/modules/services/networking/kippo.nix
index d2045c9efc5..68f26eefe27 100644
--- a/nixos/modules/services/networking/kippo.nix
+++ b/nixos/modules/services/networking/kippo.nix
@@ -16,12 +16,12 @@ rec {
services.kippo = {
enable = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''Enable the kippo honeypot ssh server.'';
};
port = mkOption {
default = 2222;
- type = types.uniq types.int;
+ type = types.int;
description = ''TCP port number for kippo to bind to.'';
};
hostname = mkOption {
diff --git a/nixos/modules/services/networking/minidlna.nix b/nixos/modules/services/networking/minidlna.nix
index 989ee4d91af..51850496e2c 100644
--- a/nixos/modules/services/networking/minidlna.nix
+++ b/nixos/modules/services/networking/minidlna.nix
@@ -30,7 +30,7 @@ in
};
services.minidlna.mediaDirs = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
example = [ "/data/media" "V,/home/alice/video" ];
description =
diff --git a/nixos/modules/services/networking/networkmanager.nix b/nixos/modules/services/networking/networkmanager.nix
index 60f380f024b..adbc6099c95 100644
--- a/nixos/modules/services/networking/networkmanager.nix
+++ b/nixos/modules/services/networking/networkmanager.nix
@@ -118,7 +118,7 @@ in {
};
appendNameservers = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
description = ''
A list of name servers that should be appended
@@ -127,7 +127,7 @@ in {
};
insertNameservers = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
description = ''
A list of name servers that should be inserted before
diff --git a/nixos/modules/services/networking/notbit.nix b/nixos/modules/services/networking/notbit.nix
index 2e1412ff7c8..a96e181cb80 100644
--- a/nixos/modules/services/networking/notbit.nix
+++ b/nixos/modules/services/networking/notbit.nix
@@ -31,7 +31,7 @@ with lib;
services.notbit = {
enable = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = ''
Enables the notbit daemon and provides a sendmail binary named `notbit-system-sendmail` for sending mail over the system instance of notbit. Users must be in the notbit group in order to send mail over the system notbit instance. Currently mail recipt is not supported.
@@ -39,13 +39,13 @@ with lib;
};
port = mkOption {
- type = types.uniq types.int;
+ type = types.int;
default = 8444;
description = "The port which the daemon listens for other bitmessage clients";
};
nice = mkOption {
- type = types.uniq types.int;
+ type = types.int;
default = 10;
description = "Set the nice level for the notbit daemon";
};
@@ -65,19 +65,19 @@ with lib;
};
specifiedPeersOnly = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = "If true, notbit will only connect to peers specified by the peers option.";
};
allowPrivateAddresses = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = "If true, notbit will allow connections to to RFC 1918 addresses.";
};
noBootstrap = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = "If true, notbit will not bootstrap an initial peerlist from bitmessage.org servers";
};
diff --git a/nixos/modules/services/networking/ntopng.nix b/nixos/modules/services/networking/ntopng.nix
index ab86f1a5b2b..c1525711713 100644
--- a/nixos/modules/services/networking/ntopng.nix
+++ b/nixos/modules/services/networking/ntopng.nix
@@ -57,7 +57,7 @@ in
http-port = mkOption {
default = 3000;
- type = types.uniq types.int;
+ type = types.int;
description = ''
Sets the HTTP port of the embedded web server.
'';
diff --git a/nixos/modules/services/networking/polipo.nix b/nixos/modules/services/networking/polipo.nix
index 51179d9120f..847fc88ead4 100644
--- a/nixos/modules/services/networking/polipo.nix
+++ b/nixos/modules/services/networking/polipo.nix
@@ -42,7 +42,7 @@ in
};
allowedClients = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [ "127.0.0.1" "::1" ];
example = [ "127.0.0.1" "::1" "134.157.168.0/24" "2001:660:116::/48" ];
description = ''
diff --git a/nixos/modules/services/networking/quassel.nix b/nixos/modules/services/networking/quassel.nix
index 579d62884c7..005eb7bd761 100644
--- a/nixos/modules/services/networking/quassel.nix
+++ b/nixos/modules/services/networking/quassel.nix
@@ -3,7 +3,7 @@
with lib;
let
- quassel = pkgs.kde4.quasselDaemon;
+ quassel = pkgs.quasselDaemon_qt5;
cfg = config.services.quassel;
user = if cfg.user != null then cfg.user else "quassel";
in
diff --git a/nixos/modules/services/networking/skydns.nix b/nixos/modules/services/networking/skydns.nix
new file mode 100644
index 00000000000..2d0129d6310
--- /dev/null
+++ b/nixos/modules/services/networking/skydns.nix
@@ -0,0 +1,91 @@
+{ config, pkgs, lib, ... }:
+
+with lib;
+
+let
+ cfg = config.services.skydns;
+
+in {
+ options.services.skydns = {
+ enable = mkEnableOption "Whether to enable skydns service.";
+
+ etcd = {
+ machines = mkOption {
+ default = [ "http://localhost:4001" ];
+ type = types.listOf types.str;
+ description = "Skydns list of etcd endpoints to connect to.";
+ };
+
+ tlsKey = mkOption {
+ default = null;
+ type = types.nullOr types.path;
+ description = "Skydns path of TLS client certificate - private key.";
+ };
+
+ tlsPem = mkOption {
+ default = null;
+ type = types.nullOr types.path;
+ description = "Skydns path of TLS client certificate - public key.";
+ };
+
+ caCert = mkOption {
+ default = null;
+ type = types.nullOr types.path;
+ description = "Skydns path of TLS certificate authority public key.";
+ };
+ };
+
+ address = mkOption {
+ default = "0.0.0.0:53";
+ type = types.str;
+ description = "Skydns address to bind to.";
+ };
+
+ domain = mkOption {
+ default = "skydns.local.";
+ type = types.str;
+ description = "Skydns default domain if not specified by etcd config.";
+ };
+
+ nameservers = mkOption {
+ default = map (n: n + ":53") config.networking.nameservers;
+ type = types.listOf types.str;
+ description = "Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.";
+ example = ["8.8.8.8:53" "8.8.4.4:53"];
+ };
+
+ package = mkOption {
+ default = pkgs.goPackages.skydns;
+ type = types.package;
+ description = "Skydns package to use.";
+ };
+
+ extraConfig = mkOption {
+ default = {};
+ type = types.attrsOf types.str;
+ description = "Skydns attribute set of extra config options passed as environemnt variables.";
+ };
+ };
+
+ config = mkIf (cfg.enable) {
+ systemd.services.skydns = {
+ wantedBy = [ "multi-user.target" ];
+ after = [ "network.target" "etcd.service" ];
+ description = "Skydns Service";
+ environment = {
+ ETCD_MACHINES = concatStringsSep "," cfg.etcd.machines;
+ ETCD_TLSKEY = cfg.etcd.tlsKey;
+ ETCD_TLSPEM = cfg.etcd.tlsPem;
+ ETCD_CACERT = cfg.etcd.caCert;
+ SKYDNS_ADDR = cfg.address;
+ SKYDNS_DOMAIN = cfg.domain;
+ SKYDNS_NAMESERVER = concatStringsSep "," cfg.nameservers;
+ };
+ serviceConfig = {
+ ExecStart = "${cfg.package}/bin/skydns";
+ };
+ };
+
+ environment.systemPackages = [ cfg.package ];
+ };
+}
diff --git a/nixos/modules/services/networking/ssh/sshd.nix b/nixos/modules/services/networking/ssh/sshd.nix
index 14d516ddbb6..bc89ea2d3cd 100644
--- a/nixos/modules/services/networking/ssh/sshd.nix
+++ b/nixos/modules/services/networking/ssh/sshd.nix
@@ -234,7 +234,7 @@ in
];
options = {
hostNames = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
description = ''
A list of host names and/or IP numbers used for accessing
diff --git a/nixos/modules/services/networking/unifi.nix b/nixos/modules/services/networking/unifi.nix
index d6c8e0dc7a5..fd9e58f24a4 100644
--- a/nixos/modules/services/networking/unifi.nix
+++ b/nixos/modules/services/networking/unifi.nix
@@ -25,7 +25,7 @@ in
options = {
services.unifi.enable = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = ''
Whether or not to enable the unifi controller service.
diff --git a/nixos/modules/services/networking/wpa_supplicant.nix b/nixos/modules/services/networking/wpa_supplicant.nix
index e2d34ea079c..9e04bd40190 100644
--- a/nixos/modules/services/networking/wpa_supplicant.nix
+++ b/nixos/modules/services/networking/wpa_supplicant.nix
@@ -43,7 +43,7 @@ in
};
interfaces = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [];
example = [ "wlan0" "wlan1" ];
description = ''
diff --git a/nixos/modules/services/networking/znc.nix b/nixos/modules/services/networking/znc.nix
index b39aea04521..196a14dd40e 100644
--- a/nixos/modules/services/networking/znc.nix
+++ b/nixos/modules/services/networking/znc.nix
@@ -144,7 +144,7 @@ in
*/
confOptions = {
modules = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [ "partyline" "webadmin" "adminlog" "log" ];
example = [ "partyline" "webadmin" "adminlog" "log" ];
description = ''
@@ -153,7 +153,7 @@ in
};
userModules = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default = [ ];
example = [ "fish" "push" ];
description = ''
diff --git a/nixos/modules/services/scheduling/chronos.nix b/nixos/modules/services/scheduling/chronos.nix
index f36b886a744..db1f0f5f00c 100644
--- a/nixos/modules/services/scheduling/chronos.nix
+++ b/nixos/modules/services/scheduling/chronos.nix
@@ -13,7 +13,7 @@ in {
enable = mkOption {
description = "Whether to enable graphite web frontend.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
httpPort = mkOption {
diff --git a/nixos/modules/services/scheduling/marathon.nix b/nixos/modules/services/scheduling/marathon.nix
index b9f4a808b0c..4e837c62dc1 100644
--- a/nixos/modules/services/scheduling/marathon.nix
+++ b/nixos/modules/services/scheduling/marathon.nix
@@ -12,7 +12,7 @@ in {
options.services.marathon = {
enable = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = ''
Whether to enable the marathon mesos framework.
diff --git a/nixos/modules/services/search/elasticsearch.nix b/nixos/modules/services/search/elasticsearch.nix
index 12f163db463..64620bf1604 100644
--- a/nixos/modules/services/search/elasticsearch.nix
+++ b/nixos/modules/services/search/elasticsearch.nix
@@ -34,7 +34,7 @@ in {
enable = mkOption {
description = "Whether to enable elasticsearch.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
host = mkOption {
@@ -102,7 +102,7 @@ in {
extraCmdLineOptions = mkOption {
description = "Extra command line options for the elasticsearch launcher.";
default = [];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = [ "-Djava.net.preferIPv4Stack=true" ];
};
diff --git a/nixos/modules/services/torrent/peerflix.nix b/nixos/modules/services/torrent/peerflix.nix
index 0360deac08b..38fbd3b226c 100644
--- a/nixos/modules/services/torrent/peerflix.nix
+++ b/nixos/modules/services/torrent/peerflix.nix
@@ -20,7 +20,7 @@ in {
enable = mkOption {
description = "Whether to enable peerflix service.";
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
};
stateDir = mkOption {
diff --git a/nixos/modules/services/torrent/transmission.nix b/nixos/modules/services/torrent/transmission.nix
index 135113b3ceb..cf548bc696c 100644
--- a/nixos/modules/services/torrent/transmission.nix
+++ b/nixos/modules/services/torrent/transmission.nix
@@ -27,7 +27,7 @@ in
options = {
services.transmission = {
enable = mkOption {
- type = types.uniq types.bool;
+ type = types.bool;
default = false;
description = ''
Whether or not to enable the headless Transmission BitTorrent daemon.
@@ -66,7 +66,7 @@ in
};
port = mkOption {
- type = types.uniq types.int;
+ type = types.int;
default = 9091;
description = "TCP port number to run the RPC/web interface.";
};
diff --git a/nixos/modules/services/web-servers/lighttpd/cgit.nix b/nixos/modules/services/web-servers/lighttpd/cgit.nix
index 34b2fa600ad..c8590e6a54e 100644
--- a/nixos/modules/services/web-servers/lighttpd/cgit.nix
+++ b/nixos/modules/services/web-servers/lighttpd/cgit.nix
@@ -15,7 +15,7 @@ in
enable = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
If true, enable cgit (fast web interface for git repositories) as a
sub-service in lighttpd. cgit will be accessible at
diff --git a/nixos/modules/services/web-servers/lighttpd/default.nix b/nixos/modules/services/web-servers/lighttpd/default.nix
index 06f310eeb93..2c662c0aead 100644
--- a/nixos/modules/services/web-servers/lighttpd/default.nix
+++ b/nixos/modules/services/web-servers/lighttpd/default.nix
@@ -122,7 +122,7 @@ in
enable = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
Enable the lighttpd web server.
'';
@@ -130,7 +130,7 @@ in
port = mkOption {
default = 80;
- type = types.uniq types.int;
+ type = types.int;
description = ''
TCP port number for lighttpd to bind to.
'';
@@ -146,7 +146,7 @@ in
mod_userdir = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
If true, requests in the form /~user/page.html are rewritten to take
the file public_html/page.html from the home directory of the user.
@@ -168,7 +168,7 @@ in
mod_status = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
Show server status overview at /server-status, statistics at
/server-statistics and list of loaded modules at /server-config.
diff --git a/nixos/modules/services/web-servers/lighttpd/gitweb.nix b/nixos/modules/services/web-servers/lighttpd/gitweb.nix
index ef7072ecba3..f12cc973446 100644
--- a/nixos/modules/services/web-servers/lighttpd/gitweb.nix
+++ b/nixos/modules/services/web-servers/lighttpd/gitweb.nix
@@ -17,7 +17,7 @@ in
enable = mkOption {
default = false;
- type = types.uniq types.bool;
+ type = types.bool;
description = ''
If true, enable gitweb in lighttpd. Access it at http://yourserver/gitweb
'';
diff --git a/nixos/modules/services/x11/display-managers/lightdm.nix b/nixos/modules/services/x11/display-managers/lightdm.nix
index f6de8c02b18..d05edabca62 100644
--- a/nixos/modules/services/x11/display-managers/lightdm.nix
+++ b/nixos/modules/services/x11/display-managers/lightdm.nix
@@ -104,7 +104,7 @@ in
};
background = mkOption {
- default = "${pkgs.nixos-artwork}/gnome/Gnome_Dark.png";
+ default = "${pkgs.nixos-artwork}/share/artwork/gnome/Gnome_Dark.png";
description = ''
The background image or color to use.
'';
diff --git a/nixos/modules/services/x11/redshift.nix b/nixos/modules/services/x11/redshift.nix
index d73b58de6c0..99d19f6ab15 100644
--- a/nixos/modules/services/x11/redshift.nix
+++ b/nixos/modules/services/x11/redshift.nix
@@ -14,24 +14,24 @@ in {
services.redshift.latitude = mkOption {
description = "Your current latitude";
- type = types.uniq types.string;
+ type = types.str;
};
services.redshift.longitude = mkOption {
description = "Your current longitude";
- type = types.uniq types.string;
+ type = types.str;
};
services.redshift.temperature = {
day = mkOption {
description = "Colour temperature to use during day time";
default = 5500;
- type = types.uniq types.int;
+ type = types.int;
};
night = mkOption {
description = "Colour temperature to use during night time";
default = 3700;
- type = types.uniq types.int;
+ type = types.int;
};
};
@@ -39,12 +39,12 @@ in {
day = mkOption {
description = "Screen brightness to apply during the day (between 0.1 and 1.0)";
default = "1";
- type = types.uniq types.string;
+ type = types.str;
};
night = mkOption {
description = "Screen brightness to apply during the night (between 0.1 and 1.0)";
default = "1";
- type = types.uniq types.string;
+ type = types.str;
};
};
};
diff --git a/nixos/modules/services/x11/unclutter.nix b/nixos/modules/services/x11/unclutter.nix
index 556d9e187fd..6e8719e1053 100644
--- a/nixos/modules/services/x11/unclutter.nix
+++ b/nixos/modules/services/x11/unclutter.nix
@@ -13,7 +13,7 @@ in {
services.unclutter.arguments = mkOption {
description = "Arguments to pass to unclutter command";
default = "-idle 1";
- type = types.uniq types.string;
+ type = types.str;
};
};
diff --git a/nixos/modules/services/x11/xserver.nix b/nixos/modules/services/x11/xserver.nix
index 5198864ef6e..9fddc6a7210 100644
--- a/nixos/modules/services/x11/xserver.nix
+++ b/nixos/modules/services/x11/xserver.nix
@@ -469,6 +469,11 @@ in
environment.pathsToLink =
[ "/etc/xdg" "/share/xdg" "/share/applications" "/share/icons" "/share/pixmaps" ];
+ # The default max inotify watches is 8192.
+ # Nowadays most apps require a good number of inotify watches,
+ # the value below is used by default on several other distros.
+ boot.kernel.sysctl."fs.inotify.max_user_watches" = mkDefault 524288;
+
systemd.defaultUnit = mkIf cfg.autorun "graphical.target";
systemd.services.display-manager =
diff --git a/nixos/modules/system/boot/kernel.nix b/nixos/modules/system/boot/kernel.nix
index 0cae9cb844c..63a095be631 100644
--- a/nixos/modules/system/boot/kernel.nix
+++ b/nixos/modules/system/boot/kernel.nix
@@ -159,7 +159,7 @@ in
boot.kernel.sysctl."kernel.printk" = config.boot.consoleLogLevel;
- boot.kernelModules = [ "loop" "configs" ];
+ boot.kernelModules = [ "loop" "configs" "atkbd" ];
boot.initrd.availableKernelModules =
[ # Note: most of these (especially the SATA/PATA modules)
diff --git a/nixos/modules/system/boot/loader/grub/grub.nix b/nixos/modules/system/boot/loader/grub/grub.nix
index 22af11b484e..3c879450ba6 100644
--- a/nixos/modules/system/boot/loader/grub/grub.nix
+++ b/nixos/modules/system/boot/loader/grub/grub.nix
@@ -27,8 +27,13 @@ let
f = x: if x == null then "" else "" + x;
- grubConfig = args: pkgs.writeText "grub-config.xml" (builtins.toXML
- { splashImage = f config.boot.loader.grub.splashImage;
+ grubConfig = args:
+ let
+ efiSysMountPoint = if args.efiSysMountPoint == null then args.path else args.efiSysMountPoint;
+ efiSysMountPoint' = replaceChars [ "/" ] [ "-" ] efiSysMountPoint;
+ in
+ pkgs.writeText "grub-config.xml" (builtins.toXML
+ { splashImage = f cfg.splashImage;
grub = f grub;
grubTarget = f (grub.grubTarget or "");
shell = "${pkgs.stdenv.shell}";
@@ -36,13 +41,15 @@ let
grubEfi = f grubEfi;
grubTargetEfi = if cfg.efiSupport && (cfg.version == 2) then f (grubEfi.grubTarget or "") else "";
bootPath = args.path;
- efiSysMountPoint = if args.efiSysMountPoint == null then args.path else args.efiSysMountPoint;
+ storePath = config.boot.loader.grub.storePath;
+ bootloaderId = if args.efiBootloaderId == null then "NixOS${efiSysMountPoint'}" else args.efiBootloaderId;
+ inherit efiSysMountPoint;
inherit (args) devices;
inherit (efi) canTouchEfiVariables;
inherit (cfg)
version extraConfig extraPerEntryConfig extraEntries
extraEntriesBeforeNixOS extraPrepareConfig configurationLimit copyKernels timeout
- default fsIdentifier efiSupport;
+ default fsIdentifier efiSupport gfxmodeEfi gfxmodeBios;
path = (makeSearchPath "bin" ([
pkgs.coreutils pkgs.gnused pkgs.gnugrep pkgs.findutils pkgs.diffutils pkgs.btrfsProgs
pkgs.utillinux ] ++ (if cfg.efiSupport && (cfg.version == 2) then [pkgs.efibootmgr ] else [])
@@ -141,6 +148,17 @@ in
'';
};
+ efiBootloaderId = mkOption {
+ default = null;
+ example = "NixOS-fsid";
+ type = types.nullOr types.str;
+ description = ''
+ The id of the bootloader to store in efi nvram.
+ The default is to name it NixOS and append the path or efiSysMountPoint.
+ This is only used if boot.loader.efi.canTouchEfiVariables is true.
+ '';
+ };
+
devices = mkOption {
default = [ ];
example = [ "/dev/sda" "/dev/sdb" ];
@@ -163,6 +181,15 @@ in
'';
};
+ storePath = mkOption {
+ default = "/nix/store";
+ type = types.str;
+ description = ''
+ Path to the Nix store when looking for kernels at boot.
+ Only makes sense when copyKernels is false.
+ '';
+ };
+
extraPrepareConfig = mkOption {
default = "";
type = types.lines;
@@ -242,6 +269,24 @@ in
'';
};
+ gfxmodeEfi = mkOption {
+ default = "auto";
+ example = "1024x768";
+ type = types.str;
+ description = ''
+ The gfxmode to pass to grub when loading a graphical boot interface under efi.
+ '';
+ };
+
+ gfxmodeBios = mkOption {
+ default = "1024x768";
+ example = "auto";
+ type = types.str;
+ description = ''
+ The gfxmode to pass to grub when loading a graphical boot interface under bios.
+ '';
+ };
+
configurationLimit = mkOption {
default = 100;
example = 120;
@@ -337,7 +382,7 @@ in
sha256 = "14kqdx2lfqvh40h6fjjzqgff1mwk74dmbjvmqphi6azzra7z8d59";
}
# GRUB 1.97 doesn't support gzipped XPMs.
- else "${pkgs.nixos-artwork}/gnome/Gnome_Dark.png");
+ else "${pkgs.nixos-artwork}/share/artwork/gnome/Gnome_Dark.png");
}
(mkIf cfg.enable {
diff --git a/nixos/modules/system/boot/loader/grub/install-grub.pl b/nixos/modules/system/boot/loader/grub/install-grub.pl
index fcf5871203d..9db4c4003c9 100644
--- a/nixos/modules/system/boot/loader/grub/install-grub.pl
+++ b/nixos/modules/system/boot/loader/grub/install-grub.pl
@@ -55,8 +55,12 @@ my $fsIdentifier = get("fsIdentifier");
my $grubEfi = get("grubEfi");
my $grubTargetEfi = get("grubTargetEfi");
my $bootPath = get("bootPath");
+my $storePath = get("storePath");
my $canTouchEfiVariables = get("canTouchEfiVariables");
my $efiSysMountPoint = get("efiSysMountPoint");
+my $gfxmodeEfi = get("gfxmodeEfi");
+my $gfxmodeBios = get("gfxmodeBios");
+my $bootloaderId = get("bootloaderId");
$ENV{'PATH'} = get("path");
die "unsupported GRUB version\n" if $grubVersion != 1 && $grubVersion != 2;
@@ -210,7 +214,7 @@ sub GrubFs {
my $grubBoot = GrubFs($bootPath);
my $grubStore;
if ($copyKernels == 0) {
- $grubStore = GrubFs("/nix/store");
+ $grubStore = GrubFs($storePath);
}
# Generate the header.
@@ -255,14 +259,22 @@ else {
fi
# Setup the graphics stack for bios and efi systems
- insmod vbe
- insmod efi_gop
- insmod efi_uga
+ if [ \"\${grub_platform}\" = \"efi\" ]; then
+ insmod efi_gop
+ insmod efi_uga
+ else
+ insmod vbe
+ fi
insmod font
if loadfont " . $grubBoot->path . "/grub/fonts/unicode.pf2; then
insmod gfxterm
- set gfxmode=auto
- set gfxpayload=keep
+ if [ \"\${grub_platform}\" = \"efi\" ]; then
+ set gfxmode=$gfxmodeEfi
+ set gfxpayload=keep
+ else
+ set gfxmode=$gfxmodeBios
+ set gfxpayload=text
+ fi
terminal_output gfxterm
fi
";
@@ -511,7 +523,7 @@ if (($requireNewInstall != 0) && ($efiTarget eq "no" || $efiTarget eq "both")) {
if (($requireNewInstall != 0) && ($efiTarget eq "only" || $efiTarget eq "both")) {
print STDERR "installing the GRUB $grubVersion EFI boot loader into $efiSysMountPoint...\n";
if ($canTouchEfiVariables eq "true") {
- system("$grubEfi/sbin/grub-install", "--recheck", "--target=$grubTargetEfi", "--boot-directory=$bootPath", "--efi-directory=$efiSysMountPoint") == 0
+ system("$grubEfi/sbin/grub-install", "--recheck", "--target=$grubTargetEfi", "--boot-directory=$bootPath", "--efi-directory=$efiSysMountPoint", "--bootloader-id=$bootloaderId") == 0
or die "$0: installation of GRUB EFI into $efiSysMountPoint failed\n";
} else {
system("$grubEfi/sbin/grub-install", "--recheck", "--target=$grubTargetEfi", "--boot-directory=$bootPath", "--efi-directory=$efiSysMountPoint", "--no-nvram") == 0
diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix
index 03070bef483..3799e5d7ddb 100644
--- a/nixos/modules/system/boot/luksroot.nix
+++ b/nixos/modules/system/boot/luksroot.nix
@@ -211,7 +211,7 @@ in
};
boot.initrd.luks.cryptoModules = mkOption {
- type = types.listOf types.string;
+ type = types.listOf types.str;
default =
[ "aes" "aes_generic" "blowfish" "twofish"
"serpent" "cbc" "xts" "lrw" "sha1" "sha256" "sha512"
diff --git a/nixos/modules/system/boot/modprobe.nix b/nixos/modules/system/boot/modprobe.nix
index a1feaad6132..a3b616ff3ef 100644
--- a/nixos/modules/system/boot/modprobe.nix
+++ b/nixos/modules/system/boot/modprobe.nix
@@ -101,7 +101,7 @@ with lib;
echo ${config.system.sbin.modprobe}/sbin/modprobe > /proc/sys/kernel/modprobe
'';
- environment.variables.MODULE_DIR = "/run/current-system/kernel-modules/lib/modules";
+ environment.sessionVariables.MODULE_DIR = "/run/current-system/kernel-modules/lib/modules";
};
diff --git a/nixos/modules/system/boot/stage-1-init.sh b/nixos/modules/system/boot/stage-1-init.sh
index 5af644279e5..e8d276920a8 100644
--- a/nixos/modules/system/boot/stage-1-init.sh
+++ b/nixos/modules/system/boot/stage-1-init.sh
@@ -317,7 +317,7 @@ mountFS() {
# Try to find and mount the root device.
-mkdir /mnt-root
+mkdir -p $targetRoot
exec 3< @fsInfo@
diff --git a/nixos/modules/system/boot/stage-1.nix b/nixos/modules/system/boot/stage-1.nix
index 8b58eccdcec..893861a2eed 100644
--- a/nixos/modules/system/boot/stage-1.nix
+++ b/nixos/modules/system/boot/stage-1.nix
@@ -358,7 +358,7 @@ in
boot.initrd.supportedFilesystems = mkOption {
default = [ ];
example = [ "btrfs" ];
- type = types.listOf types.string;
+ type = types.listOf types.str;
description = "Names of supported filesystem types in the initial ramdisk.";
};
diff --git a/nixos/modules/system/boot/systemd-unit-options.nix b/nixos/modules/system/boot/systemd-unit-options.nix
index 57831a5e6ef..a7a334dec28 100644
--- a/nixos/modules/system/boot/systemd-unit-options.nix
+++ b/nixos/modules/system/boot/systemd-unit-options.nix
@@ -42,13 +42,13 @@ in rec {
requiredBy = mkOption {
default = [];
- type = types.listOf types.string;
+ type = types.listOf types.str;
description = "Units that require (i.e. depend on and need to go down with) this unit.";
};
wantedBy = mkOption {
default = [];
- type = types.listOf types.string;
+ type = types.listOf types.str;
description = "Units that want (i.e. depend on) this unit.";
};
diff --git a/nixos/modules/system/boot/systemd.nix b/nixos/modules/system/boot/systemd.nix
index 1fde720bba0..2ad12c51b21 100644
--- a/nixos/modules/system/boot/systemd.nix
+++ b/nixos/modules/system/boot/systemd.nix
@@ -491,7 +491,7 @@ in
services.journald.rateLimitBurst = mkOption {
default = 100;
- type = types.uniq types.int;
+ type = types.int;
description = ''
Configures the rate limiting burst limit (number of messages per
interval) that is applied to all messages generated on the system.
diff --git a/nixos/modules/tasks/filesystems.nix b/nixos/modules/tasks/filesystems.nix
index ce8d6079faa..ce21d9fe762 100644
--- a/nixos/modules/tasks/filesystems.nix
+++ b/nixos/modules/tasks/filesystems.nix
@@ -121,7 +121,7 @@ in
boot.supportedFilesystems = mkOption {
default = [ ];
example = [ "btrfs" ];
- type = types.listOf types.string;
+ type = types.listOf types.str;
description = "Names of supported filesystem types.";
};
diff --git a/nixos/modules/tasks/kbd.nix b/nixos/modules/tasks/kbd.nix
index 8d26998021d..69f004888f5 100644
--- a/nixos/modules/tasks/kbd.nix
+++ b/nixos/modules/tasks/kbd.nix
@@ -22,7 +22,7 @@ in
# FIXME: still needed?
boot.extraTTYs = mkOption {
default = [];
- type = types.listOf types.string;
+ type = types.listOf types.str;
example = ["tty8" "tty9"];
description = ''
Tty (virtual console) devices, in addition to the consoles on
diff --git a/nixos/modules/tasks/network-interfaces.nix b/nixos/modules/tasks/network-interfaces.nix
index 71a721abba2..6361ed2cc43 100644
--- a/nixos/modules/tasks/network-interfaces.nix
+++ b/nixos/modules/tasks/network-interfaces.nix
@@ -392,7 +392,7 @@ in
interfaces = mkOption {
example = [ "eth0" "eth1" ];
- type = types.listOf types.string;
+ type = types.listOf types.str;
description =
"The physical network interfaces connected by the bridge.";
};
diff --git a/nixos/modules/virtualisation/amazon-init.nix b/nixos/modules/virtualisation/amazon-init.nix
new file mode 100644
index 00000000000..6058a7019e8
--- /dev/null
+++ b/nixos/modules/virtualisation/amazon-init.nix
@@ -0,0 +1,52 @@
+{ config, pkgs, modulesPath, ... }:
+
+# This attempts to pull a nix expression from this EC2 instance's user-data.
+
+let
+ bootScript = pkgs.writeScript "bootscript.sh" ''
+ #!${pkgs.stdenv.shell} -eux
+
+ echo "attempting to fetch configuration from user-data..."
+
+ export PATH=${config.nix.package}/bin:${pkgs.wget}/bin:${pkgs.systemd}/bin:${pkgs.gnugrep}/bin:${pkgs.gnused}/bin:${config.system.build.nixos-rebuild}/bin:$PATH
+ export NIX_PATH=/nix/var/nix/profiles/per-user/root/channels/nixos:nixos-config=/etc/nixos/configuration.nix:/nix/var/nix/profiles/per-user/root/channels
+
+ userData="$(mktemp)"
+ wget -q --wait=1 --tries=0 --retry-connrefused -O - http://169.254.169.254/2011-01-01/user-data > "$userData"
+
+ if [[ $? -eq 0 ]]; then
+ echo "user-data fetched"
+ # If the user-data looks like it could be a nix expression,
+ # copy it over. Also, look for a magic three-hash comment and set
+ # that as the channel.
+ if sed '/^\(#\|SSH_HOST_.*\)/d' < "$userData" | grep -q '\S'; then
+ channels="$(grep '^###' "$userData" | sed 's|###\s*||')"
+ printf "%s" "$channels" | while read channel; do
+ echo "writing channel: $channel"
+ done
+
+ if [[ -n "$channels" ]]; then
+ printf "%s" "$channels" > /root/.nix-channels
+ nix-channel --update
+ fi
+
+ echo "setting configuration"
+ cp "$userData" /etc/nixos/configuration.nix
+ else
+ echo "user-data does not appear to be a nix expression; ignoring"
+ fi
+ else
+ echo "failed to fetch user-data"
+ fi
+
+ type -f nixos-rebuild
+
+ nixos-rebuild switch
+ '';
+in {
+ imports = [ "${modulesPath}/virtualisation/amazon-image.nix" ];
+ ec2.metadata = true;
+ boot.postBootCommands = ''
+ ${bootScript} &
+ '';
+}
diff --git a/nixos/modules/virtualisation/qemu-vm.nix b/nixos/modules/virtualisation/qemu-vm.nix
index 8c7e840910d..dcb498493fa 100644
--- a/nixos/modules/virtualisation/qemu-vm.nix
+++ b/nixos/modules/virtualisation/qemu-vm.nix
@@ -61,8 +61,8 @@ let
idx=2
extraDisks=""
${flip concatMapStrings cfg.emptyDiskImages (size: ''
- ${pkgs.qemu_kvm}/bin/qemu-img create -f raw "empty$idx" "${toString size}M"
- extraDisks="$extraDisks -drive index=$idx,file=$(pwd)/empty$idx,if=virtio,werror=report"
+ ${pkgs.qemu_kvm}/bin/qemu-img create -f qcow2 "empty$idx.qcow2" "${toString size}M"
+ extraDisks="$extraDisks -drive index=$idx,file=$(pwd)/empty$idx.qcow2,if=virtio,werror=report"
idx=$((idx + 1))
'')}
@@ -83,7 +83,7 @@ let
'' else ''
''}
'' else ''
- -drive file=$NIX_DISK_IMAGE,if=virtio,cache=writeback,werror=report \
+ -drive index=0,id=drive1,file=$NIX_DISK_IMAGE,if=virtio,cache=writeback,werror=report \
-kernel ${config.system.build.toplevel}/kernel \
-initrd ${config.system.build.toplevel}/initrd \
-append "$(cat ${config.system.build.toplevel}/kernel-params) init=${config.system.build.toplevel}/init regInfo=${regInfo} ${kernelConsole} $QEMU_KERNEL_PARAMS" \
@@ -165,7 +165,7 @@ let
${config.system.build.toplevel}/bin/switch-to-configuration boot
umount /boot
- ''
+ '' # */
);
in
@@ -204,17 +204,25 @@ in
'';
};
+ virtualisation.bootDevice =
+ mkOption {
+ type = types.str;
+ default = "/dev/vda";
+ description =
+ ''
+ The disk to be used for the root filesystem.
+ '';
+ };
+
virtualisation.emptyDiskImages =
mkOption {
default = [];
type = types.listOf types.int;
description =
''
- Additional disk images to provide to the VM, the value is a list of
- sizes in megabytes the empty disk should be.
-
- These disks are writeable by the VM and will be thrown away
- afterwards.
+ Additional disk images to provide to the VM. The value is
+ a list of size in megabytes of each disk. These disks are
+ writeable by the VM.
'';
};
@@ -341,7 +349,7 @@ in
config = {
- boot.loader.grub.device = mkVMOverride "/dev/vda";
+ boot.loader.grub.device = mkVMOverride cfg.bootDevice;
boot.initrd.extraUtilsCommands =
''
@@ -353,9 +361,9 @@ in
''
# If the disk image appears to be empty, run mke2fs to
# initialise.
- FSTYPE=$(blkid -o value -s TYPE /dev/vda || true)
+ FSTYPE=$(blkid -o value -s TYPE ${cfg.bootDevice} || true)
if test -z "$FSTYPE"; then
- mke2fs -t ext4 /dev/vda
+ mke2fs -t ext4 ${cfg.bootDevice}
fi
'';
@@ -396,7 +404,7 @@ in
# attribute should be disregarded for the purpose of building a VM
# test image (since those filesystems don't exist in the VM).
fileSystems = mkVMOverride (
- { "/".device = "/dev/vda";
+ { "/".device = cfg.bootDevice;
${if cfg.writableStore then "/nix/.ro-store" else "/nix/store"} =
{ device = "store";
fsType = "9p";
diff --git a/nixos/modules/virtualisation/xen-dom0.nix b/nixos/modules/virtualisation/xen-dom0.nix
index ea9f61aad6a..7b5d714622c 100644
--- a/nixos/modules/virtualisation/xen-dom0.nix
+++ b/nixos/modules/virtualisation/xen-dom0.nix
@@ -6,7 +6,6 @@ with lib;
let
cfg = config.virtualisation.xen;
- xen = pkgs.xen;
in
{
@@ -88,9 +87,9 @@ in
message = "Xen currently does not support EFI boot";
} ];
- virtualisation.xen.stored = mkDefault "${xen}/bin/oxenstored";
+ virtualisation.xen.stored = mkDefault "${pkgs.xen}/bin/oxenstored";
- environment.systemPackages = [ xen ];
+ environment.systemPackages = [ pkgs.xen ];
# Make sure Domain 0 gets the required configuration
#boot.kernelPackages = pkgs.boot.kernelPackages.override { features={xen_dom0=true;}; };
@@ -122,7 +121,7 @@ in
system.extraSystemBuilderCmds =
''
- ln -s ${xen}/boot/xen.gz $out/xen.gz
+ ln -s ${pkgs.xen}/boot/xen.gz $out/xen.gz
echo "${toString cfg.bootParams}" > $out/xen-params
'';
@@ -158,13 +157,16 @@ in
environment.etc =
- [ { source = "${xen}/etc/xen/xl.conf";
+ [ { source = "${pkgs.xen}/etc/xen/xl.conf";
target = "xen/xl.conf";
}
+ { source = "${pkgs.xen}/etc/xen/scripts";
+ target = "xen/scripts";
+ }
];
# Xen provides udev rules.
- services.udev.packages = [ xen ];
+ services.udev.packages = [ pkgs.xen ];
services.udev.path = [ pkgs.bridge-utils pkgs.iproute ];
@@ -260,16 +262,13 @@ in
wantedBy = [ "multi-user.target" ];
before = [ "xen-domains.service" ];
serviceConfig.RemainAfterExit = "yes";
- serviceConfig.ExecStart = ''
- ${pkgs.bridge-utils}/bin/brctl addbr ${cfg.bridge}
- ${pkgs.inetutils}/bin/ifconfig ${cfg.bridge} up
- '';
- serviceConfig.ExecStop = ''
- ${pkgs.inetutils}/bin/ifconfig ${cfg.bridge} down
- ${pkgs.bridge-utils}/bin/brctl delbr ${cfg.bridge}
- '';
+ serviceConfig.ExecStart = "${pkgs.bridge-utils}/bin/brctl addbr ${cfg.bridge}";
+ postStart = "${pkgs.inetutils}/bin/ifconfig ${cfg.bridge} up";
+ serviceConfig.ExecStop = "${pkgs.inetutils}/bin/ifconfig ${cfg.bridge} down";
+ postStop = "${pkgs.bridge-utils}/bin/brctl delbr ${cfg.bridge}";
};
+
systemd.services.xen-domains = {
description = "Xen domains - automatically starts, saves and restores Xen domains";
wantedBy = [ "multi-user.target" ];
diff --git a/nixos/release-combined.nix b/nixos/release-combined.nix
index d501c2e7c53..191d5044341 100644
--- a/nixos/release-combined.nix
+++ b/nixos/release-combined.nix
@@ -52,6 +52,7 @@ in rec {
(all nixos.tests.firefox)
(all nixos.tests.firewall)
(all nixos.tests.gnome3)
+ (all nixos.tests.installer.grub1)
(all nixos.tests.installer.lvm)
(all nixos.tests.installer.luksroot)
(all nixos.tests.installer.separateBoot)
@@ -62,6 +63,7 @@ in rec {
(all nixos.tests.installer.btrfsSimple)
(all nixos.tests.installer.btrfsSubvols)
(all nixos.tests.installer.btrfsSubvolDefault)
+ (all nixos.tests.bootBiosCdrom)
(all nixos.tests.ipv6)
(all nixos.tests.kde4)
(all nixos.tests.lightdm)
diff --git a/nixos/release.nix b/nixos/release.nix
index 3559926eefa..a8b6d275f1d 100644
--- a/nixos/release.nix
+++ b/nixos/release.nix
@@ -93,37 +93,7 @@ let
in rec {
- channel =
- pkgs.releaseTools.makeSourceTarball {
- name = "nixos-channel";
-
- src = nixpkgs;
-
- officialRelease = false; # FIXME: fix this in makeSourceTarball
- inherit version versionSuffix;
-
- buildInputs = [ pkgs.nixUnstable ];
-
- expr = builtins.readFile lib/channel-expr.nix;
-
- distPhase = ''
- rm -rf .git
- echo -n $VERSION_SUFFIX > .version-suffix
- echo -n ${nixpkgs.rev or nixpkgs.shortRev} > .git-revision
- releaseName=nixos-$VERSION$VERSION_SUFFIX
- mkdir -p $out/tarballs
- mkdir ../$releaseName
- cp -prd . ../$releaseName/nixpkgs
- chmod -R u+w ../$releaseName
- ln -s nixpkgs/nixos ../$releaseName/nixos
- echo "$expr" > ../$releaseName/default.nix
- NIX_STATE_DIR=$TMPDIR nix-env -f ../$releaseName/default.nix -qaP --meta --xml \* > /dev/null
- cd ..
- chmod -R u+w $releaseName
- tar cfJ $out/tarballs/$releaseName.tar.xz $releaseName
- ''; # */
- };
-
+ channel = import lib/make-channel.nix { inherit pkgs nixpkgs version versionSuffix; };
manual = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manual);
manualPDF = (buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manualPDF)).x86_64-linux;
@@ -247,6 +217,8 @@ in rec {
tests.docker = hydraJob (import tests/docker.nix { system = "x86_64-linux"; });
tests.dockerRegistry = hydraJob (import tests/docker-registry.nix { system = "x86_64-linux"; });
tests.etcd = hydraJob (import tests/etcd.nix { system = "x86_64-linux"; });
+ tests.ec2-nixops = hydraJob (import tests/ec2.nix { system = "x86_64-linux"; }).boot-ec2-nixops;
+ tests.ec2-config = hydraJob (import tests/ec2.nix { system = "x86_64-linux"; }).boot-ec2-config;
tests.firefox = callTest tests/firefox.nix {};
tests.firewall = callTest tests/firewall.nix {};
tests.fleet = hydraJob (import tests/fleet.nix { system = "x86_64-linux"; });
@@ -256,7 +228,6 @@ in rec {
tests.installer.grub1 = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).grub1.test);
tests.installer.lvm = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).lvm.test);
tests.installer.luksroot = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).luksroot.test);
- tests.installer.rebuildCD = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).rebuildCD.test);
tests.installer.separateBoot = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).separateBoot.test);
tests.installer.simple = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).simple.test);
tests.installer.simpleLabels = forAllSystems (system: hydraJob (import tests/installer.nix { inherit system; }).simpleLabels.test);
diff --git a/nixos/tests/ec2.nix b/nixos/tests/ec2.nix
new file mode 100644
index 00000000000..1296ff4e8e3
--- /dev/null
+++ b/nixos/tests/ec2.nix
@@ -0,0 +1,119 @@
+{ system ? builtins.currentSystem }:
+
+with import ../lib/testing.nix { inherit system; };
+with import ../lib/qemu-flags.nix;
+with pkgs.lib;
+
+let
+ image =
+ (import ../lib/eval-config.nix {
+ inherit system;
+ modules = [
+ ../maintainers/scripts/ec2/amazon-hvm-config.nix
+ ../../nixos/modules/testing/test-instrumentation.nix
+ { boot.initrd.kernelModules = [ "virtio" "virtio_blk" "virtio_pci" "virtio_ring" ]; }
+ ];
+ }).config.system.build.amazonImage;
+
+ makeEc2Test = { name, userData, script, hostname ? "ec2-instance", sshPublicKey ? null }:
+ let
+ metaData = pkgs.stdenv.mkDerivation {
+ name = "metadata";
+ buildCommand = ''
+ mkdir -p $out/2011-01-01
+ ln -s ${pkgs.writeText "userData" userData} $out/2011-01-01/user-data
+ mkdir -p $out/1.0/meta-data
+ echo "${hostname}" > $out/1.0/meta-data/hostname
+ '' + optionalString (sshPublicKey != null) ''
+ mkdir -p $out/1.0/meta-data/public-keys/0
+ ln -s ${pkgs.writeText "sshPublicKey" sshPublicKey} $out/1.0/meta-data/public-keys/0/openssh-key
+ '';
+ };
+ in makeTest {
+ name = "ec2-" + name;
+ nodes = {};
+ testScript =
+ ''
+ use File::Temp qw/ tempfile /;
+ my ($fh, $filename) = tempfile();
+
+ `qemu-img create -f qcow2 -o backing_file=${image}/nixos.img $filename`;
+
+ my $startCommand = "qemu-kvm -m 768 -net nic -net 'user,net=169.254.0.0/16,guestfwd=tcp:169.254.169.254:80-cmd:${pkgs.micro-httpd}/bin/micro_httpd ${metaData}'";
+ $startCommand .= " -drive file=" . Cwd::abs_path($filename) . ",if=virtio,werror=report";
+ $startCommand .= " \$QEMU_OPTS";
+
+ my $machine = createMachine({ startCommand => $startCommand });
+ ${script}
+ '';
+ };
+
+ snakeOilPrivateKey = [
+ "-----BEGIN EC PRIVATE KEY-----"
+ "MHcCAQEEIHQf/khLvYrQ8IOika5yqtWvI0oquHlpRLTZiJy5dRJmoAoGCCqGSM49"
+ "AwEHoUQDQgAEKF0DYGbBwbj06tA3fd/+yP44cvmwmHBWXZCKbS+RQlAKvLXMWkpN"
+ "r1lwMyJZoSGgBHoUahoYjTh9/sJL7XLJtA=="
+ "-----END EC PRIVATE KEY-----"
+ ];
+
+ snakeOilPublicKey = pkgs.lib.concatStrings [
+ "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHA"
+ "yNTYAAABBBChdA2BmwcG49OrQN33f/sj+OHL5sJhwVl2Qim0vkUJQCry1zFpKTa"
+ "9ZcDMiWaEhoAR6FGoaGI04ff7CS+1yybQ= snakeoil"
+ ];
+in {
+ boot-ec2-nixops = makeEc2Test {
+ name = "nixops-userdata";
+ sshPublicKey = snakeOilPublicKey; # That's right folks! My user's key is also the host key!
+
+ userData = ''
+ SSH_HOST_DSA_KEY_PUB:${snakeOilPublicKey}
+ SSH_HOST_DSA_KEY:${pkgs.lib.concatStringsSep "|" snakeOilPrivateKey}
+ '';
+ script = ''
+ $machine->start;
+ $machine->waitForFile("/root/user-data");
+ $machine->waitForUnit("sshd.service");
+
+ # We have no keys configured on the client side yet, so this should fail
+ $machine->fail("ssh -o BatchMode=yes localhost exit");
+
+ # Let's install our client private key
+ $machine->succeed("mkdir -p ~/.ssh");
+ ${concatMapStrings (s: "$machine->succeed('echo ${s} >> ~/.ssh/id_ecdsa');") snakeOilPrivateKey}
+ $machine->succeed("chmod 600 ~/.ssh/id_ecdsa");
+
+ # We haven't configured the host key yet, so this should still fail
+ $machine->fail("ssh -o BatchMode=yes localhost exit");
+
+ # Add the host key; ssh should finally succeed
+ $machine->succeed("echo localhost,127.0.0.1 ${snakeOilPublicKey} > ~/.ssh/known_hosts");
+ $machine->succeed("ssh -o BatchMode=yes localhost exit");
+
+ $machine->shutdown;
+ '';
+ };
+
+ boot-ec2-config = makeEc2Test {
+ name = "config-userdata";
+ sshPublicKey = snakeOilPublicKey;
+
+ userData = ''
+ ### http://nixos.org/channels/nixos-unstable nixos
+ {
+ imports = [
+
+
+ ];
+ environment.etc.testFile = {
+ text = "whoa";
+ };
+ }
+ '';
+ script = ''
+ $machine->start;
+ $machine->waitForFile("/etc/testFile");
+ $machine->succeed("cat /etc/testFile | grep -q 'whoa'");
+ '';
+ };
+}
diff --git a/nixos/tests/installer.nix b/nixos/tests/installer.nix
index fc65f392a1f..4feed56cd67 100644
--- a/nixos/tests/installer.nix
+++ b/nixos/tests/installer.nix
@@ -6,46 +6,9 @@ with pkgs.lib;
let
- # Build the ISO. This is the regular minimal installation CD but
- # with test instrumentation.
- iso =
- (import ../lib/eval-config.nix {
- inherit system;
- modules =
- [ ../modules/installer/cd-dvd/installation-cd-minimal.nix
- ../modules/testing/test-instrumentation.nix
- { key = "serial";
- boot.loader.grub.timeout = mkOverride 0 0;
-
- # The test cannot access the network, so any sources we
- # need must be included in the ISO.
- isoImage.storeContents =
- [ pkgs.glibcLocales
- pkgs.sudo
- pkgs.docbook5
- pkgs.docbook5_xsl
- pkgs.unionfs-fuse
-
- # Bootloader support
- pkgs.grub
- pkgs.grub2
- pkgs.grub2_efi
- pkgs.gummiboot
- pkgs.perlPackages.XMLLibXML
- pkgs.perlPackages.ListCompare
- ];
-
- # Don't use https://cache.nixos.org since the fake
- # cache.nixos.org doesn't do https.
- nix.binaryCaches = [ http://cache.nixos.org/ ];
- }
- ];
- }).config.system.build.isoImage;
-
-
# The configuration to install.
- makeConfig = { testChannel, grubVersion, grubDevice, grubIdentifier
- , extraConfig, readOnly ? true, forceGrubReinstallCount ? 0
+ makeConfig = { grubVersion, grubDevice, grubIdentifier
+ , extraConfig, forceGrubReinstallCount ? 0
}:
pkgs.writeText "configuration.nix" ''
{ config, lib, pkgs, modulesPath, ... }:
@@ -53,7 +16,6 @@ let
{ imports =
[ ./hardware-configuration.nix
-
];
boot.loader.grub.version = ${toString grubVersion};
@@ -66,96 +28,39 @@ let
boot.loader.grub.configurationLimit = 100 + ${toString forceGrubReinstallCount};
- ${optionalString (!readOnly) "nix.readOnlyStore = false;"}
+ hardware.enableAllFirmware = lib.mkForce false;
- environment.systemPackages = [ ${optionalString testChannel "pkgs.rlwrap"} ];
-
- nix.binaryCaches = [ http://cache.nixos.org/ ];
${replaceChars ["\n"] ["\n "] extraConfig}
}
'';
- # Configuration of a web server that simulates the Nixpkgs channel
- # distribution server.
- webserver =
- { config, lib, pkgs, ... }:
-
- { services.httpd.enable = true;
- services.httpd.adminAddr = "foo@example.org";
- services.httpd.servedDirs = singleton
- { urlPath = "/";
- dir = "/tmp/channel";
- };
-
- virtualisation.writableStore = true;
- virtualisation.pathsInNixDB = channelContents ++ [ pkgs.hello.src ];
- virtualisation.memorySize = 768;
-
- networking.firewall.allowedTCPPorts = [ 80 ];
- };
-
channelContents = [ pkgs.rlwrap ];
- # The test script boots the CD, installs NixOS on an empty hard
+ # The test script boots a NixOS VM, installs NixOS on an empty hard
# disk, and then reboot from the hard disk. It's parameterized with
# a test script fragment `createPartitions', which must create
# partitions and filesystems.
- testScriptFun = { createPartitions, testChannel, grubVersion, grubDevice
+ testScriptFun = { createPartitions, grubVersion, grubDevice
, grubIdentifier, preBootCommands, extraConfig
}:
let
- # FIXME: OVMF doesn't boot from virtio http://www.mail-archive.com/edk2-devel@lists.sourceforge.net/msg01501.html
iface = if grubVersion == 1 then "scsi" else "virtio";
qemuFlags =
- (if iso.system == "x86_64-linux" then "-m 768 " else "-m 512 ") +
- (optionalString (iso.system == "x86_64-linux") "-cpu kvm64 ");
- hdFlags =''hda => "harddisk", hdaInterface => "${iface}", '';
+ (if system == "x86_64-linux" then "-m 768 " else "-m 512 ") +
+ (optionalString (system == "x86_64-linux") "-cpu kvm64 ");
+ hdFlags = ''hda => "vm-state-machine/machine.qcow2", hdaInterface => "${iface}", '';
in
''
- createDisk("harddisk", 8 * 1024);
-
- my $machine = createMachine({ ${hdFlags}
- cdrom => glob("${iso}/iso/*.iso"),
- qemuFlags => "${qemuFlags} " . '${optionalString testChannel (toString (qemuNICFlags 1 1 2))}' });
$machine->start;
- ${optionalString testChannel ''
- # Create a channel on the web server containing a few packages
- # to simulate the Nixpkgs channel.
- $webserver->start;
- $webserver->waitForUnit("httpd");
- $webserver->succeed(
- "nix-push --bzip2 --dest /tmp/channel --manifest --url-prefix http://nixos.org/channels/nixos-unstable " .
- "${toString channelContents} >&2");
- $webserver->succeed("mkdir /tmp/channel/sha256");
- $webserver->succeed("cp ${pkgs.hello.src} /tmp/channel/sha256/${pkgs.hello.src.outputHash}");
- ''}
-
# Make sure that we get a login prompt etc.
$machine->succeed("echo hello");
#$machine->waitForUnit('getty@tty2');
$machine->waitForUnit("rogue");
$machine->waitForUnit("nixos-manual");
- ${optionalString testChannel ''
- $machine->waitForUnit("dhcpcd");
-
- # Allow the machine to talk to the fake nixos.org.
- $machine->succeed(
- "rm /etc/hosts",
- "echo 192.168.1.1 nixos.org cache.nixos.org tarballs.nixos.org > /etc/hosts",
- "ifconfig eth1 up 192.168.1.2",
- );
-
- # Test nix-env.
- $machine->fail("hello");
- $machine->succeed("nix-env -i hello");
- $machine->succeed("hello") =~ /Hello, world/
- or die "bad `hello' output";
- ''}
-
# Wait for hard disks to appear in /dev
$machine->succeed("udevadm settle");
@@ -163,14 +68,12 @@ let
${createPartitions}
# Create the NixOS configuration.
- $machine->succeed(
- "nixos-generate-config --root /mnt",
- );
+ $machine->succeed("nixos-generate-config --root /mnt");
$machine->succeed("cat /mnt/etc/nixos/hardware-configuration.nix >&2");
$machine->copyFileFromHost(
- "${ makeConfig { inherit testChannel grubVersion grubDevice grubIdentifier extraConfig; } }",
+ "${ makeConfig { inherit grubVersion grubDevice grubIdentifier extraConfig; } }",
"/mnt/etc/nixos/configuration.nix");
# Perform the installation.
@@ -188,7 +91,7 @@ let
# Now see if we can boot the installation.
$machine = createMachine({ ${hdFlags} qemuFlags => "${qemuFlags}" });
- # For example to enter LUKS passphrase
+ # For example to enter LUKS passphrase.
${preBootCommands}
# Did /boot get mounted?
@@ -209,9 +112,9 @@ let
$machine->succeed("type -tP ls | tee /dev/stderr") =~ /.nix-profile/
or die "nix-env failed";
- # We need to a writable nix-store on next boot
+ # We need to a writable nix-store on next boot.
$machine->copyFileFromHost(
- "${ makeConfig { inherit testChannel grubVersion grubDevice grubIdentifier extraConfig; readOnly = false; forceGrubReinstallCount = 1; } }",
+ "${ makeConfig { inherit grubVersion grubDevice grubIdentifier extraConfig; forceGrubReinstallCount = 1; } }",
"/etc/nixos/configuration.nix");
# Check whether nixos-rebuild works.
@@ -220,7 +123,7 @@ let
# Test nixos-option.
$machine->succeed("nixos-option boot.initrd.kernelModules | grep virtio_console");
$machine->succeed("nixos-option boot.initrd.kernelModules | grep 'List of modules'");
- $machine->succeed("nixos-option boot.initrd.kernelModules | grep qemu-guest.nix");
+ $machine->succeed("nixos-option boot.initrd.kernelModules | grep qemu-guest.nix");
$machine->shutdown;
@@ -229,7 +132,7 @@ let
${preBootCommands}
$machine->waitForUnit("multi-user.target");
$machine->copyFileFromHost(
- "${ makeConfig { inherit testChannel grubVersion grubDevice grubIdentifier extraConfig; readOnly = false; forceGrubReinstallCount = 2; } }",
+ "${ makeConfig { inherit grubVersion grubDevice grubIdentifier extraConfig; forceGrubReinstallCount = 2; } }",
"/etc/nixos/configuration.nix");
$machine->succeed("nixos-rebuild boot >&2");
$machine->shutdown;
@@ -245,16 +148,60 @@ let
makeInstallerTest = name:
{ createPartitions, preBootCommands ? "", extraConfig ? ""
- , testChannel ? false, grubVersion ? 2, grubDevice ? "/dev/vda"
+ , grubVersion ? 2, grubDevice ? "/dev/vda"
, grubIdentifier ? "uuid", enableOCR ? false
}:
makeTest {
- inherit iso;
- name = "installer-" + name;
- nodes = if testChannel then { inherit webserver; } else { };
inherit enableOCR;
+ name = "installer-" + name;
+
+ nodes = {
+
+ # The configuration of the machine used to run "nixos-install". It
+ # also has a web server that simulates cache.nixos.org.
+ machine =
+ { config, lib, pkgs, ... }:
+
+ { imports =
+ [ ../modules/profiles/installation-device.nix
+ ../modules/profiles/base.nix
+ ];
+
+ virtualisation.diskSize = 8 * 1024;
+ virtualisation.memorySize = 768;
+ virtualisation.writableStore = true;
+
+ # Use a small /dev/vdb as the root disk for the
+ # installer. This ensures the target disk (/dev/vda) is
+ # the same during and after installation.
+ virtualisation.emptyDiskImages = [ 512 ];
+ virtualisation.bootDevice = "/dev/vdb";
+
+ hardware.enableAllFirmware = mkForce false;
+
+ # The test cannot access the network, so any packages we
+ # need must be included in the VM.
+ system.extraDependencies =
+ [ pkgs.sudo
+ pkgs.docbook5
+ pkgs.docbook5_xsl
+ pkgs.unionfs-fuse
+ pkgs.ntp
+ pkgs.nixos-artwork
+ pkgs.gummiboot
+ pkgs.perlPackages.XMLLibXML
+ pkgs.perlPackages.ListCompare
+ ]
+ ++ optional (grubVersion == 1) pkgs.grub
+ ++ optionals (grubVersion == 2) [ pkgs.grub2 pkgs.grub2_efi ];
+
+ nix.binaryCaches = mkForce [ ];
+ };
+
+ };
+
testScript = testScriptFun {
- inherit createPartitions preBootCommands testChannel grubVersion
+ inherit createPartitions preBootCommands grubVersion
grubDevice grubIdentifier extraConfig;
};
};
@@ -281,7 +228,6 @@ in {
"mount LABEL=nixos /mnt",
);
'';
- testChannel = true;
};
# Same as the previous, but now with a separate /boot partition.
@@ -413,40 +359,11 @@ in {
"mkfs.ext3 -L nixos /dev/sda2",
"mount LABEL=nixos /mnt",
);
-
'';
grubVersion = 1;
grubDevice = "/dev/sda";
};
- # Rebuild the CD configuration with a little modification.
- rebuildCD = makeTest
- { inherit iso;
- name = "rebuild-cd";
- nodes = { };
- testScript =
- ''
- my $machine = createMachine({ cdrom => glob("${iso}/iso/*.iso"), qemuFlags => '-m 768' });
- $machine->start;
-
- # Enable sshd service.
- $machine->succeed(
- "sed -i 's,^}\$,systemd.services.sshd.wantedBy = pkgs.lib.mkOverride 0 [\"multi-user.target\"]; },' /etc/nixos/configuration.nix"
- );
-
- $machine->succeed("cat /etc/nixos/configuration.nix >&2");
-
- # Apply the new CD configuration.
- $machine->succeed("nixos-rebuild test");
-
- # Connect to it-self.
- $machine->waitForUnit("sshd");
- $machine->waitForOpenPort(22);
-
- $machine->shutdown;
- '';
- };
-
# Test using labels to identify volumes in grub
simpleLabels = makeInstallerTest "simpleLabels" {
createPartitions = ''
@@ -545,4 +462,5 @@ in {
);
'';
};
+
}
diff --git a/pkgs/applications/audio/AMB-plugins/default.nix b/pkgs/applications/audio/AMB-plugins/default.nix
new file mode 100644
index 00000000000..3ea7b90f84a
--- /dev/null
+++ b/pkgs/applications/audio/AMB-plugins/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, fetchurl, ladspaH
+}:
+
+stdenv.mkDerivation rec {
+ name = "AMB-plugins-${version}";
+ version = "0.8.1";
+ src = fetchurl {
+ url = "http://kokkinizita.linuxaudio.org/linuxaudio/downloads/${name}.tar.bz2";
+ sha256 = "0x4blm4visjqj0ndqr0cg776v3b7lvplpc8cgi9n51llhavn0jpl";
+ };
+
+ buildInputs = [ ladspaH ];
+
+ patchPhase = ''
+ sed -i 's@/usr/bin/install@install@g' Makefile
+ sed -i 's@/bin/rm@rm@g' Makefile
+ sed -i 's@/usr/lib/ladspa@$(out)/lib/ladspa@g' Makefile
+ '';
+
+ preInstall="mkdir -p $out/lib/ladspa";
+
+ meta = {
+ description = ''A set of ambisonics ladspa plugins'';
+ longDescription = ''
+ Mono and stereo to B-format panning, horizontal rotator, square, hexagon and cube decoders.
+ '';
+ version = "${version}";
+ homepage = http://kokkinizita.linuxaudio.org/linuxaudio/ladspa/index.html;
+ license = stdenv.lib.licenses.gpl2Plus;
+ maintainers = [ stdenv.lib.maintainers.magnetophon ];
+ platforms = stdenv.lib.platforms.linux;
+ };
+}
diff --git a/pkgs/applications/audio/CharacterCompressor/default.nix b/pkgs/applications/audio/CharacterCompressor/default.nix
new file mode 100644
index 00000000000..3501e04aa97
--- /dev/null
+++ b/pkgs/applications/audio/CharacterCompressor/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, fetchFromGitHub, faust2jack, faust2lv2 }:
+stdenv.mkDerivation rec {
+ name = "CharacterCompressor-${version}";
+ version = "0.2";
+
+ src = fetchFromGitHub {
+ owner = "magnetophon";
+ repo = "CharacterCompressor";
+ rev = "v${version}";
+ sha256 = "0fvi8m4nshcxypn4jgxhnh7pxp68wshhav3k8wn3il7qpw71pdxi";
+ };
+
+ buildInputs = [ faust2jack faust2lv2 ];
+
+ buildPhase = ''
+ faust2jack -t 99999 CharacterCompressor.dsp
+ faust2lv2 -t 99999 CharacterCompressor.dsp
+ '';
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp CharacterCompressor $out/bin/
+ mkdir -p $out/lib/lv2
+ cp -r CharacterCompressor.lv2/ $out/lib/lv2
+ '';
+
+ meta = {
+ description = "A compressor with character. For jack and lv2";
+ homepage = https://github.com/magnetophon/CharacterCompressor;
+ license = stdenv.lib.licenses.gpl3;
+ maintainers = [ stdenv.lib.maintainers.magnetophon ];
+ };
+}
diff --git a/pkgs/applications/audio/CompBus/default.nix b/pkgs/applications/audio/CompBus/default.nix
new file mode 100644
index 00000000000..497d1ef5243
--- /dev/null
+++ b/pkgs/applications/audio/CompBus/default.nix
@@ -0,0 +1,39 @@
+{ stdenv, fetchFromGitHub, faust2jack, faust2lv2 }:
+stdenv.mkDerivation rec {
+ name = "CompBus-${version}";
+ version = "1.1.02";
+
+ src = fetchFromGitHub {
+ owner = "magnetophon";
+ repo = "CompBus";
+ rev = "v${version}";
+ sha256 = "025vi60caxk3j2vxxrgbc59xlyr88vgn7k3127s271zvpyy7apwh";
+ };
+
+ buildInputs = [ faust2jack faust2lv2 ];
+
+ buildPhase = ''
+ for f in *.dsp;
+ do
+ faust2jack -t 99999 $f
+ faust2lv2 -t 99999 $f
+ done
+ '';
+
+ installPhase = ''
+ mkdir -p $out/lib/lv2
+ mv *.lv2/ $out/lib/lv2
+ mkdir -p $out/bin
+ for f in $(find . -executable -type f);
+ do
+ cp $f $out/bin/
+ done
+ '';
+
+ meta = {
+ description = "A group of compressors mixed into a bus, sidechained from that mix bus. For jack and lv2";
+ homepage = https://github.com/magnetophon/CompBus;
+ license = stdenv.lib.licenses.gpl3;
+ maintainers = [ stdenv.lib.maintainers.magnetophon ];
+ };
+}
diff --git a/pkgs/applications/audio/RhythmDelay/default.nix b/pkgs/applications/audio/RhythmDelay/default.nix
new file mode 100644
index 00000000000..e0cfff7c906
--- /dev/null
+++ b/pkgs/applications/audio/RhythmDelay/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, fetchFromGitHub, faust2jack, faust2lv2 }:
+stdenv.mkDerivation rec {
+ name = "RhythmDelay-${version}";
+ version = "2.0";
+
+ src = fetchFromGitHub {
+ owner = "magnetophon";
+ repo = "RhythmDelay";
+ rev = "v${version}";
+ sha256 = "0n938nm08mf3lz92k6v07k1469xxzmfkgclw40jgdssfcfa16bn7";
+ };
+
+ buildInputs = [ faust2jack faust2lv2 ];
+
+ buildPhase = ''
+ faust2jack -t 99999 RhythmDelay.dsp
+ faust2lv2 -t 99999 RhythmDelay.dsp
+ '';
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp RhythmDelay $out/bin/
+ mkdir -p $out/lib/lv2
+ cp -r RhythmDelay.lv2/ $out/lib/lv2
+ '';
+
+ meta = {
+ description = "Tap a rhythm into your delay! For jack and lv2";
+ homepage = https://github.com/magnetophon/RhythmDelay;
+ license = stdenv.lib.licenses.gpl3;
+ maintainers = [ stdenv.lib.maintainers.magnetophon ];
+ };
+}
diff --git a/pkgs/applications/audio/aacgain/default.nix b/pkgs/applications/audio/aacgain/default.nix
new file mode 100644
index 00000000000..69cc798ec0f
--- /dev/null
+++ b/pkgs/applications/audio/aacgain/default.nix
@@ -0,0 +1,46 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation {
+ name = "aacgain-1.9.0";
+ src = fetchFromGitHub {
+ owner = "mulx";
+ repo = "aacgain";
+ rev = "7c29dccd878ade1301710959aeebe87a8f0828f5";
+ sha256 = "07hl432vsscqg01b6wr99qmsj4gbx0i02x4k565432y6zpfmaxm0";
+ };
+
+ configurePhase = ''
+ cd mp4v2
+ ./configure
+
+ cd ../faad2
+ ./configure
+
+ cd ..
+ ./configure
+ '';
+
+ buildPhase = ''
+ cd mp4v2
+ make libmp4v2.la
+
+ cd ../faad2
+ make LDFLAGS=-static
+
+ cd ..
+ make
+ '';
+
+ installPhase = ''
+ strip -s aacgain/aacgain
+ install -vD aacgain/aacgain "$out/bin/aacgain"
+ '';
+
+ meta = {
+ description = "ReplayGain for AAC files";
+ homepage = https://github.com/mulx/aacgain;
+ license = stdenv.lib.licenses.gpl2;
+ platforms = stdenv.lib.platforms.linux;
+ maintainers = [ stdenv.lib.maintainers.robbinch ];
+ };
+}
diff --git a/pkgs/applications/audio/caps/default.nix b/pkgs/applications/audio/caps/default.nix
index 49880f6c0f3..b5004291271 100644
--- a/pkgs/applications/audio/caps/default.nix
+++ b/pkgs/applications/audio/caps/default.nix
@@ -1,10 +1,10 @@
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
name = "caps-${version}";
- version = "0.9.16";
+ version = "0.9.24";
src = fetchurl {
url = "http://www.quitte.de/dsp/caps_${version}.tar.bz2";
- sha256 = "117l04w2zwqak856lihmaxg6f22vlz71knpxy0axiyri0x82lbwv";
+ sha256 = "081zx0i2ysw5nmy03j60q9j11zdlg1fxws81kwanncdgayxgwipp";
};
configurePhase = ''
echo "PREFIX = $out" > defines.make
diff --git a/pkgs/applications/audio/constant-detune-chorus/default.nix b/pkgs/applications/audio/constant-detune-chorus/default.nix
new file mode 100644
index 00000000000..54fe4c866d5
--- /dev/null
+++ b/pkgs/applications/audio/constant-detune-chorus/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, fetchFromGitHub, faust2jack, faust2lv2 }:
+stdenv.mkDerivation rec {
+ name = "constant-detune-chorus-${version}";
+ version = "0.1.01";
+
+ src = fetchFromGitHub {
+ owner = "magnetophon";
+ repo = "constant-detune-chorus";
+ rev = "v${version}";
+ sha256 = "1z8aj1a36ix9jizk9wl06b3i98hrkg47qxqp8vx930r624pc5z86";
+ };
+
+ buildInputs = [ faust2jack faust2lv2 ];
+
+ buildPhase = ''
+ faust2jack -t 99999 constant-detune-chorus.dsp
+ faust2lv2 -t 99999 constant-detune-chorus.dsp
+ '';
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp constant-detune-chorus $out/bin/
+ mkdir -p $out/lib/lv2
+ cp -r constant-detune-chorus.lv2/ $out/lib/lv2
+ '';
+
+ meta = {
+ description = "A chorus algorithm that maintains constant and symmetric detuning depth (in cents), regardless of modulation rate. For jack and lv2";
+ homepage = https://github.com/magnetophon/constant-detune-chorus;
+ license = stdenv.lib.licenses.gpl3;
+ maintainers = [ stdenv.lib.maintainers.magnetophon ];
+ };
+}
diff --git a/pkgs/applications/audio/dirt/default.nix b/pkgs/applications/audio/dirt/default.nix
index b5436fde7e9..74adf4533fa 100644
--- a/pkgs/applications/audio/dirt/default.nix
+++ b/pkgs/applications/audio/dirt/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchFromGitHub, libsndfile, libsamplerate, liblo, jack2 }:
stdenv.mkDerivation rec {
- name = "dirt-git";
+ name = "dirt-2015-04-28";
src = fetchFromGitHub {
repo = "Dirt";
owner = "tidalcycles";
@@ -9,13 +9,21 @@ stdenv.mkDerivation rec {
sha256 = "1shbyp54q64g6bsl6hhch58k3z1dyyy9ph6cq2xvdf8syy00sisz";
};
buildInputs = [ libsndfile libsamplerate liblo jack2 ];
+ postPatch = ''
+ sed -i "s|./samples|$out/share/dirt/samples|" file.h
+ '';
configurePhase = ''
export DESTDIR=$out
'';
+ postInstall = ''
+ mkdir -p $out/share/dirt/
+ cp -r samples $out/share/dirt/
+ '';
- meta = {
+ meta = with stdenv.lib; {
description = "An unimpressive thingie for playing bits of samples with some level of accuracy";
homepage = "https://github.com/tidalcycles/Dirt";
- license = stdenv.lib.licenses.gpl3;
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ anderspapitto ];
};
}
diff --git a/pkgs/applications/audio/gmpc/default.nix b/pkgs/applications/audio/gmpc/default.nix
index 7cc8aeda367..4da235dd8a9 100644
--- a/pkgs/applications/audio/gmpc/default.nix
+++ b/pkgs/applications/audio/gmpc/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, libtool, intltool, pkgconfig, glib
, gtk, curl, mpd_clientlib, libsoup, gob2, vala, libunique
-, libSM, libICE, sqlite
+, libSM, libICE, sqlite, hicolor_icon_theme
}:
stdenv.mkDerivation rec {
@@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
buildInputs = [
libtool intltool pkgconfig glib gtk curl mpd_clientlib libsoup
- libunique libmpd gob2 vala libSM libICE sqlite
+ libunique libmpd gob2 vala libSM libICE sqlite hicolor_icon_theme
];
meta = with stdenv.lib; {
diff --git a/pkgs/applications/audio/google-musicmanager/default.nix b/pkgs/applications/audio/google-musicmanager/default.nix
index e7c513febf5..2edc1c00ce6 100644
--- a/pkgs/applications/audio/google-musicmanager/default.nix
+++ b/pkgs/applications/audio/google-musicmanager/default.nix
@@ -2,10 +2,11 @@
, libvorbis }:
assert stdenv.system == "x86_64-linux" || stdenv.system == "1686-linux";
-
+let
+ archUrl = name: arch: "http://dl.google.com/linux/musicmanager/deb/pool/main/g/google-musicmanager-beta/${name}_${arch}.deb";
+in
stdenv.mkDerivation rec {
- debversion = "beta_1.0.129.6633-r0";
- version = "beta_1.0.129.6633-r0"; # friendly to nix-env version sorting algo
+ version = "beta_1.0.182.3607-r0"; # friendly to nix-env version sorting algo
product = "google-musicmanager";
name = "${product}-${version}";
@@ -16,12 +17,12 @@ stdenv.mkDerivation rec {
src = if stdenv.system == "x86_64-linux"
then fetchurl {
- url = "http://dl.google.com/linux/musicmanager/deb/pool/main/g/google-musicmanager-beta/google-musicmanager-${version}_amd64.deb";
- sha256 = "1fq2p721mzv8nd4dq6i9xiqvvqd5ak3v142vsxchg6yn14a9kbvr";
+ url = archUrl name "amd64";
+ sha256 = "141x986haxg3r72ggh8prz0qg298jkad1ys8sdvsac92p4adcqx4";
}
else fetchurl {
- url = "http://dl.google.com/linux/musicmanager/deb/pool/main/g/google-musicmanager-beta/google-musicmanager-${version}_i386.deb";
- sha256 = "7914e3e6e2adb2e952ebaf383db5e04727c29cfa83401007f29977f6c5ff6873";
+ url = archUrl name "i386";
+ sha256 = "076iaa7pxhj8b1hlg5ah9jfm4qgzgjc9ivvg2l18wp045gnycv1l";
};
unpackPhase = ''
diff --git a/pkgs/applications/audio/keyfinder/default.nix b/pkgs/applications/audio/keyfinder/default.nix
index bea869ea318..d3438e1ada4 100644
--- a/pkgs/applications/audio/keyfinder/default.nix
+++ b/pkgs/applications/audio/keyfinder/default.nix
@@ -1,17 +1,18 @@
{ stdenv, fetchFromGitHub, libav_0_8, libkeyfinder, qt5, taglib }:
-stdenv.mkDerivation rec {
- version = "1.25-17-gf670607";
+let version = "1.26"; in
+stdenv.mkDerivation {
name = "keyfinder-${version}";
src = fetchFromGitHub {
+ sha256 = "1sfnywc6jdpm03344i6i4pz13mqa4i5agagj4k6252m63cqmjkrc";
+ rev = version;
repo = "is_KeyFinder";
owner = "ibsh";
- rev = "f6706074435ac14c5238ee3f0dd22ac22d72af9c";
- sha256 = "1sfnywc6jdpm03344i6i4pz13mqa4i5agagj4k6252m63cqmjkrc";
};
meta = with stdenv.lib; {
+ inherit version;
description = "Musical key detection for digital audio (graphical UI)";
longDescription = ''
KeyFinder is an open source key detection tool, for DJs interested in
diff --git a/pkgs/applications/audio/ladspa-plugins/git.nix b/pkgs/applications/audio/ladspa-plugins/git.nix
new file mode 100644
index 00000000000..e9ab932a88e
--- /dev/null
+++ b/pkgs/applications/audio/ladspa-plugins/git.nix
@@ -0,0 +1,32 @@
+{ stdenv, fetchgit, automake, autoreconfHook, fftw, gettext, ladspaH, libxml2, pkgconfig, perl, perlPackages }:
+
+stdenv.mkDerivation {
+ name = "swh-plugins-git-2015-03-04";
+
+ src = fetchgit {
+ url = https://github.com/swh/ladspa.git;
+ rev = "4b8437e8037cace3d5bf8ce6d1d1da0182aba686";
+ sha256 = "7d9aa13a064903b330bd52e35c1f810f1c8a253ea5eb4e5a3a69a051af03150e";
+ };
+
+ buildInputs = [ automake autoreconfHook fftw gettext ladspaH libxml2 pkgconfig perl perlPackages.XMLParser ];
+
+ patchPhase = ''
+ patchShebangs .
+ patchShebangs ./metadata/
+ cp ${automake}/share/automake-*/mkinstalldirs .
+ '';
+
+ configurePhase = ''
+ autoreconf -i
+ ./configure --prefix=$out
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = http://plugin.org.uk/;
+ description = "LADSPA format audio plugins";
+ license = licenses.gpl2;
+ maintainers = [ maintainers.magnetophon ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/pkgs/applications/audio/mpc/default.nix b/pkgs/applications/audio/mpc/default.nix
index 9224e21185b..2f798fff7b9 100644
--- a/pkgs/applications/audio/mpc/default.nix
+++ b/pkgs/applications/audio/mpc/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, mpd_clientlib }:
stdenv.mkDerivation rec {
- version = "0.26";
+ version = "0.27";
name = "mpc-${version}";
src = fetchurl {
url = "http://www.musicpd.org/download/mpc/0/${name}.tar.xz";
- sha256 = "0hp2qv6w2v902dhrmck5hg32s1ai6xiv9n61a3n6prfcfdqmywr0";
+ sha256 = "0r10wsqxsi07gns6mfnicvpci0sbwwj4qa9iyr1ysrgadl5bx8j5";
};
buildInputs = [ mpd_clientlib ];
diff --git a/pkgs/applications/audio/mpg123/default.nix b/pkgs/applications/audio/mpg123/default.nix
index 3edb7ae6793..eb1f8f4faa8 100644
--- a/pkgs/applications/audio/mpg123/default.nix
+++ b/pkgs/applications/audio/mpg123/default.nix
@@ -1,11 +1,11 @@
{stdenv, fetchurl, alsaLib }:
-stdenv.mkDerivation {
- name = "mpg123-1.19.0";
+stdenv.mkDerivation rec {
+ name = "mpg123-1.22.2";
src = fetchurl {
- url = mirror://sourceforge/mpg123/mpg123-1.19.0.tar.bz2;
- sha256 = "06xhd68mj9yp0r6l771aq0d7xgnl402a3wm2mvhxmd3w3ph29446";
+ url = "mirror://sourceforge/mpg123/${name}.tar.bz2";
+ sha256 = "0i1phi6fdjas37y00h3j8rb0b8ngr9az6hy5ff5bl53ify3j87kd";
};
buildInputs = stdenv.lib.optional (!stdenv.isDarwin) alsaLib;
@@ -16,8 +16,9 @@ stdenv.mkDerivation {
};
meta = {
- description = "Command-line MP3 player";
- homepage = http://mpg123.sourceforge.net/;
- license = "LGPL";
+ description = "Fast console MPEG Audio Player and decoder library";
+ homepage = http://mpg123.org;
+ license = stdenv.lib.licenses.lgpl21;
+ maintainers = [ stdenv.lib.maintainers.ftrvxmtrx ];
};
}
diff --git a/pkgs/applications/audio/musescore/default.nix b/pkgs/applications/audio/musescore/default.nix
index 9dbebe31a38..bfbfa577531 100644
--- a/pkgs/applications/audio/musescore/default.nix
+++ b/pkgs/applications/audio/musescore/default.nix
@@ -1,27 +1,47 @@
-{ stdenv, fetchurl, makeWrapper, cmake, qt5, pkgconfig, alsaLib, portaudio, jack2
-, lame, libsndfile, libvorbis }:
+{ stdenv, fetchurl, cmake, pkgconfig
+, alsaLib, freetype, jack2, lame, libogg, libpulseaudio, libsndfile, libvorbis
+, portaudio, qt5 #, tesseract
+}:
stdenv.mkDerivation rec {
name = "musescore-${version}";
- version = "2.0.0";
+ version = "2.0.1";
src = fetchurl {
url = "https://github.com/musescore/MuseScore/archive/v${version}.tar.gz";
- sha256 = "1a4fz9pqwz59brfa7qn61364hyd07lsq3lflkzn1w2q21d7xd20w";
+ sha256 = "0n4xk35jggdq2dcizqjq1kdpclih4scpl93ymmxahvfa1vvwn5iw";
};
- buildInputs = [
- makeWrapper cmake qt5.base pkgconfig alsaLib portaudio jack2 lame libsndfile libvorbis
+ makeFlags = [
+ "PREFIX=$(out)"
];
- patchPhase = ''
- sed s,"/usr/local",$out, -i Makefile
+ cmakeFlags = [
+ "-DAEOLUS=OFF"
+ "-DZERBERUS=ON"
+ "-DOSC=ON=ON"
+ "-DOMR=OFF" # TODO: add OMR support, CLEF_G not declared error
+ "-DOCR=OFF" # Not necessary without OMR
+ "-DSOUNDFONT3=ON"
+ "-DHAS_AUDIOFILE=ON"
+ "-DBUILD_JACK=ON"
+ ];
+
+ preBuild = ''
+ make lupdate
+ make lrelease
'';
- preBuild = "make lrelease";
+ nativeBuildInputs = [ cmake pkgconfig ];
+
+ buildInputs = [
+ alsaLib jack2 freetype lame libogg libpulseaudio libsndfile libvorbis
+ portaudio qt5.base qt5.declarative qt5.enginio qt5.script qt5.svg qt5.tools
+ qt5.webkit qt5.xmlpatterns #tesseract
+ ];
meta = with stdenv.lib; {
- description = "Qt-based score editor";
+ description = "Music notation and composition software";
homepage = http://musescore.org/;
license = licenses.gpl2;
platforms = platforms.linux;
diff --git a/pkgs/applications/audio/pd-plugins/puremapping/default.nix b/pkgs/applications/audio/pd-plugins/puremapping/default.nix
index fc7fc5ee3d0..2e9a37a2f0d 100644
--- a/pkgs/applications/audio/pd-plugins/puremapping/default.nix
+++ b/pkgs/applications/audio/pd-plugins/puremapping/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, unzip, puredata }:
stdenv.mkDerivation rec {
- name = "puremapping";
+ name = "puremapping-1.01";
src = fetchurl {
url = "http://www.chnry.net/ch/IMG/zip/puremapping-libdir-generic.zip";
diff --git a/pkgs/applications/audio/sonic-visualiser/default.nix b/pkgs/applications/audio/sonic-visualiser/default.nix
index 9cd1a3d0345..70162b9d185 100644
--- a/pkgs/applications/audio/sonic-visualiser/default.nix
+++ b/pkgs/applications/audio/sonic-visualiser/default.nix
@@ -3,7 +3,7 @@
{ stdenv, fetchurl, alsaLib, bzip2, fftw, jack2, libX11, liblo
, libmad, libogg, librdf, librdf_raptor, librdf_rasqal, libsamplerate
, libsndfile, pkgconfig, libpulseaudio, qt5, redland
-, rubberband, serd, sord, vampSDK
+, rubberband, serd, sord, vampSDK, fftwFloat
}:
stdenv.mkDerivation rec {
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
};
buildInputs =
- [ libsndfile qt5.base fftw /* should be fftw3f ??*/ bzip2 librdf rubberband
+ [ libsndfile qt5.base fftw fftwFloat bzip2 librdf rubberband
libsamplerate vampSDK alsaLib librdf_raptor librdf_rasqal redland
serd
sord
diff --git a/pkgs/applications/audio/wavegain/default.nix b/pkgs/applications/audio/wavegain/default.nix
index 2ce59f005fd..5f56fb7297f 100644
--- a/pkgs/applications/audio/wavegain/default.nix
+++ b/pkgs/applications/audio/wavegain/default.nix
@@ -1,10 +1,12 @@
-{ stdenv, fetchgit }:
+{ stdenv, fetchFromGitHub }:
stdenv.mkDerivation {
name = "wavegain-1.3.1";
- src = fetchgit {
- url = "https://github.com/MestreLion/wavegain.git";
- sha256 = "1h886xijc9d7h4p6qx12c6kgwmp6s1bdycnyylkayfncczzlbi24";
+ src = fetchFromGitHub {
+ owner = "MestreLion";
+ repo = "wavegain";
+ rev = "c928eaf97aeec5732625491b64c882e08e314fee";
+ sha256 = "0wghqnsbypmr4xcrhb568bfjdnxzzp8qgnws3jslzmzf34dpk5ls";
};
installPhase = ''
@@ -17,6 +19,6 @@ stdenv.mkDerivation {
homepage = https://github.com/MestreLion/wavegain;
license = stdenv.lib.licenses.lgpl21;
platforms = stdenv.lib.platforms.linux;
- maintainers = [ stdenv.lib.maintainers.devhell ];
+ maintainers = [ stdenv.lib.maintainers.robbinch ];
};
}
diff --git a/pkgs/applications/editors/emacs-24/default.nix b/pkgs/applications/editors/emacs-24/default.nix
index 01895647a6b..e0439f45a9c 100644
--- a/pkgs/applications/editors/emacs-24/default.nix
+++ b/pkgs/applications/editors/emacs-24/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, ncurses, x11, libXaw, libXpm, Xaw3d
, pkgconfig, gtk, libXft, dbus, libpng, libjpeg, libungif
, libtiff, librsvg, texinfo, gconf, libxml2, imagemagick, gnutls
-, alsaLib, cairo
+, alsaLib, cairo, acl, gpm
, withX ? !stdenv.isDarwin
, withGTK3 ? false, gtk3 ? null
, withGTK2 ? true, gtk2
@@ -36,7 +36,7 @@ stdenv.mkDerivation rec {
];
buildInputs =
- [ ncurses gconf libxml2 gnutls alsaLib pkgconfig texinfo ]
+ [ ncurses gconf libxml2 gnutls alsaLib pkgconfig texinfo acl gpm ]
++ stdenv.lib.optional stdenv.isLinux dbus
++ stdenv.lib.optionals withX
[ x11 libXaw Xaw3d libXpm libpng libjpeg libungif libtiff librsvg libXft
diff --git a/pkgs/applications/editors/emacs-modes/monky/default.nix b/pkgs/applications/editors/emacs-modes/monky/default.nix
new file mode 100644
index 00000000000..8e35a4e2b57
--- /dev/null
+++ b/pkgs/applications/editors/emacs-modes/monky/default.nix
@@ -0,0 +1,19 @@
+{ stdenv, fetchurl, emacs, unzip }:
+
+stdenv.mkDerivation {
+ name = "emacs-monky-20150404";
+
+ src = fetchurl {
+ url = "https://github.com/ananthakumaran/monky/archive/48c0200910739b6521f26f6423b2bfb8c38b4482.zip";
+ sha256 = "0yp3pzddx7yki9n3qrriqa5p442qyrdivvlc4xbl024vzjyzddrj";
+ };
+
+ buildInputs = [ emacs unzip ];
+
+ buildPhase = "emacs -L . --batch -f batch-byte-compile *.el";
+
+ installPhase = ''
+ install -d $out/share/emacs/site-lisp
+ install *.el *.elc $out/share/emacs/site-lisp
+ '';
+}
diff --git a/pkgs/applications/editors/monodevelop/default.nix b/pkgs/applications/editors/monodevelop/default.nix
index b04e37746e0..b27bc75ed59 100644
--- a/pkgs/applications/editors/monodevelop/default.nix
+++ b/pkgs/applications/editors/monodevelop/default.nix
@@ -1,6 +1,7 @@
-{ stdenv, fetchurl, fetchgit
+{ stdenv, fetchurl, fetchgit, fetchNuGet
, autoconf, automake, pkgconfig, shared_mime_info, intltool
, glib, mono, gtk-sharp, gnome, gnome-sharp, unzip
+, dotnetPackages
}:
stdenv.mkDerivation rec {
@@ -13,79 +14,33 @@ stdenv.mkDerivation rec {
sha256 = "1bgqvlfi6pilj2zxsviqilh63qq98wsijqdiqwpkqchcw741zlyn";
};
- srcNugetBinary = fetchgit {
- url = "https://github.com/mono/nuget-binary.git";
- rev = "da1f2102f8172df6f7a1370a4998e3f88b91c047";
- sha256 = "1hbnckc4gvqkknf8gh1k7iwqb4vdzifdjd19i60fnczly5v8m1c3";
- };
-
- srcNUnit = fetchurl {
- url = "https://www.nuget.org/api/v2/package/NUnit/2.6.3";
- sha256 = "0bb16i4ggwz32wkxsh485wf014cqqzhbyx0b3wbpmqjw7p4canph";
- };
-
- srcNUnitRunners = fetchurl {
- url = "https://www.nuget.org/api/v2/package/NUnit.Runners/2.6.3";
- sha256 = "0qwx1i9lxkp9pijj2bsczzgsamz651hngkxraqjap1v4m7d09a3b";
- };
-
- srcNUnit2510 = fetchurl {
+ nunit2510 = fetchurl {
url = "http://launchpad.net/nunitv2/2.5/2.5.10/+download/NUnit-2.5.10.11092.zip";
sha256 = "0k5h5bz1p2v3d0w0hpkpbpvdkcszgp8sr9ik498r1bs72w5qlwnc";
};
- srcNugetSystemWebMvcExtensions = fetchurl {
- url = https://www.nuget.org/api/v2/package/System.Web.Mvc.Extensions.Mvc.4/1.0.9;
- sha256 = "19wi662m8primpimzifv8k560m6ymm73z0mf1r8ixl0xqag1hx6j";
- };
-
- srcNugetMicrosoftAspNetMvc = fetchurl {
- url = https://www.nuget.org/api/v2/package/Microsoft.AspNet.Mvc/5.2.2;
- sha256 = "1jwfmz42kw2yb1g2hgp2h34fc4wx6s8z71da3mw5i4ivs25w9n2b";
- };
-
- srcNugetMicrosoftAspNetRazor = fetchurl {
- url = https://www.nuget.org/api/v2/package/Microsoft.AspNet.Razor/3.2.2;
- sha256 = "1db3apn4vzz1bx6q5fyv6nyx0drz095xgazqbw60qnhfs7z45axd";
- };
-
- srcNugetMicrosoftAspNetWebPages = fetchurl {
- url = https://www.nuget.org/api/v2/package/Microsoft.AspNet.WebPages/3.2.2;
- sha256 = "17fwb5yj165sql80i47zirjnm0gr4n8ypz408mz7p8a1n40r4i5l";
- };
-
- srcNugetMicrosoftWebInfrastructure = fetchurl {
- url = https://www.nuget.org/api/v2/package/Microsoft.Web.Infrastructure/1.0.0.0;
- sha256 = "1mxl9dri5729d0jl84gkpqifqf4xzb6aw1rzcfh6l0r24bix9afn";
- };
-
postPatch = ''
# From https://bugzilla.xamarin.com/show_bug.cgi?id=23696#c19
- # it seems parts of MonoDevelop 5.2+ need NUnit 2.6.4, which isn't included
- # (?), so download it and put it in the right place in the tree
- mkdir packages
- unzip ${srcNUnit} -d packages/NUnit.2.6.3
- unzip ${srcNUnitRunners} -d packages/NUnit.Runners.2.6.3
-
# cecil needs NUnit 2.5.10 - this is also missing from the tar
- unzip -j ${srcNUnit2510} -d external/cecil/Test/libs/nunit-2.5.10 NUnit-2.5.10.11092/bin/net-2.0/framework/\*
+ unzip -j ${nunit2510} -d external/cecil/Test/libs/nunit-2.5.10 NUnit-2.5.10.11092/bin/net-2.0/framework/\*
# the tar doesn't include the nuget binary, so grab it from github and copy it
# into the right place
- cp -vfR ${srcNugetBinary}/* external/nuget-binary/
-
- # AspNet plugin requires these packages
- unzip ${srcNugetSystemWebMvcExtensions} -d packages/System.Web.Mvc.Extensions.Mvc.4.1.0.9
- unzip ${srcNugetMicrosoftAspNetMvc} -d packages/Microsoft.AspNet.Mvc.5.2.2
- unzip ${srcNugetMicrosoftAspNetRazor} -d packages/Microsoft.AspNet.Razor.3.2.2
- unzip ${srcNugetMicrosoftAspNetWebPages} -d packages/Microsoft.AspNet.WebPages.3.2.2
- unzip ${srcNugetMicrosoftWebInfrastructure} -d packages/Microsoft.Web.Infrastructure.1.0.0.0
+ cp -vfR "$(dirname $(pkg-config NuGet.Core --variable=Libraries))"/* external/nuget-binary/
'';
+ # Revert this commit which broke the ability to use pkg-config to locate dlls
+ patchFlags = [ "-p2" ];
+ patches = [ ./git-revert-12d610fb3f6dce121df538e36f21d8c2eeb0a6e3.patch ];
+
buildInputs = [
autoconf automake pkgconfig shared_mime_info intltool
mono gtk-sharp gnome-sharp unzip
+ pkgconfig
+ dotnetPackages.NUnit
+ dotnetPackages.NUnitRunners
+ dotnetPackages.Nuget
];
preConfigure = "patchShebangs ./configure";
@@ -108,6 +63,12 @@ stdenv.mkDerivation rec {
>
EOF
done
+
+ # Without this, you get a missing DLL error any time you install an addin..
+ ln -sv `pkg-config nunit.core --variable=Libraries` $out/lib/monodevelop/AddIns/NUnit
+ ln -sv `pkg-config nunit.core.interfaces --variable=Libraries` $out/lib/monodevelop/AddIns/NUnit
+ ln -sv `pkg-config nunit.framework --variable=Libraries` $out/lib/monodevelop/AddIns/NUnit
+ ln -sv `pkg-config nunit.util --variable=Libraries` $out/lib/monodevelop/AddIns/NUnit
'';
dontStrip = true;
diff --git a/pkgs/applications/editors/monodevelop/git-revert-12d610fb3f6dce121df538e36f21d8c2eeb0a6e3.patch b/pkgs/applications/editors/monodevelop/git-revert-12d610fb3f6dce121df538e36f21d8c2eeb0a6e3.patch
new file mode 100644
index 00000000000..969aad33ec0
--- /dev/null
+++ b/pkgs/applications/editors/monodevelop/git-revert-12d610fb3f6dce121df538e36f21d8c2eeb0a6e3.patch
@@ -0,0 +1,57 @@
+diff --git a/main/src/addins/AspNet/MonoDevelop.AspNet.csproj b/main/src/addins/AspNet/MonoDevelop.AspNet.csproj
+index 02d3a01..c6daaad 100644
+--- a/main/src/addins/AspNet/MonoDevelop.AspNet.csproj
++++ b/main/src/addins/AspNet/MonoDevelop.AspNet.csproj
+@@ -452,34 +452,6 @@
+
+ PreserveNewest
+
+-
+- System.Web.Mvc.dll
+- PreserveNewest
+-
+-
+- System.Web.Razor.dll
+- PreserveNewest
+-
+-
+- System.Web.Helpers.dll
+- PreserveNewest
+-
+-
+- System.Web.WebPages.Deployment.dll
+- PreserveNewest
+-
+-
+- System.Web.WebPages.dll
+- PreserveNewest
+-
+-
+- System.Web.WebPages.Razor.dll
+- PreserveNewest
+-
+-
+- Microsoft.Web.Infrastructure.dll
+- PreserveNewest
+-
+
+
+
+diff --git a/main/src/addins/AspNet/Properties/MonoDevelop.AspNet.addin.xml b/main/src/addins/AspNet/Properties/MonoDevelop.AspNet.addin.xml
+index eab7c32..4a75311 100644
+--- a/main/src/addins/AspNet/Properties/MonoDevelop.AspNet.addin.xml
++++ b/main/src/addins/AspNet/Properties/MonoDevelop.AspNet.addin.xml
+@@ -1,13 +1,6 @@
+
+
+
+-
+-
+-
+-
+-
+-
+-
+
+
+
diff --git a/pkgs/applications/editors/neovim/default.nix b/pkgs/applications/editors/neovim/default.nix
index f19c1b65e13..3943a9910a4 100644
--- a/pkgs/applications/editors/neovim/default.nix
+++ b/pkgs/applications/editors/neovim/default.nix
@@ -1,20 +1,22 @@
-{ stdenv, fetchFromGitHub, cmake, gettext, glib, libmsgpack
-, libtermkey, libtool, libuv, lpeg, lua, luajit, luaMessagePack
-, luabitop, ncurses, perl, pkgconfig, unibilium
-, withJemalloc ? true, jemalloc }:
+{ stdenv, fetchFromGitHub, cmake, gettext, glib, libmsgpack, libtermkey
+, libtool, libuv, lpeg, lua, luajit, luaMessagePack, luabitop, ncurses, perl
+, pkgconfig, unibilium, makeWrapper, vimUtils
-let version = "2015-05-26"; in
-stdenv.mkDerivation rec {
- name = "neovim-${version}";
+, withPython ? true, pythonPackages, extraPythonPackages ? []
+, withPython3 ? true, python3Packages, extraPython3Packages ? []
+, withJemalloc ? true, jemalloc
- src = fetchFromGitHub {
- sha256 = "0sszpqlq0yp6r62zgcjcmnllc058wzzh9ccvgb2jh9k19ksszyhc";
- rev = "5a9ad68b258f33ebd7fa0a5da47b308f50f1e5e7";
- repo = "neovim";
- owner = "neovim";
- };
+, vimAlias ? false
+, configure ? null
+}:
- # FIXME: this is NOT the libvterm already in nixpkgs, but some NIH silliness:
+with stdenv.lib;
+
+let
+
+ version = "2015-06-09";
+
+ # Note: this is NOT the libvterm already in nixpkgs, but some NIH silliness:
neovimLibvterm = let version = "2015-02-23"; in stdenv.mkDerivation rec {
name = "neovim-libvterm-${version}";
@@ -27,11 +29,12 @@ stdenv.mkDerivation rec {
buildInputs = [ libtool perl ];
- makeFlags = "PREFIX=$(out)";
+ makeFlags = [ "PREFIX=$(out)" ]
+ ++ stdenv.lib.optional stdenv.isDarwin "LIBTOOL=${libtool}/bin/libtool";
enableParallelBuilding = true;
- meta = with stdenv.lib; {
+ meta = {
description = "VT220/xterm/ECMA-48 terminal emulator library";
homepage = http://www.leonerd.org.uk/code/libvterm/;
license = licenses.mit;
@@ -40,49 +43,108 @@ stdenv.mkDerivation rec {
};
};
- enableParallelBuilding = true;
-
- buildInputs = [
- cmake
- glib
- libtermkey
- libuv
- luajit
- lua
- lpeg
- luaMessagePack
- luabitop
- libmsgpack
- ncurses
- neovimLibvterm
- pkgconfig
- unibilium
- ] ++ stdenv.lib.optional withJemalloc jemalloc;
- nativeBuildInputs = [
- gettext
- ];
-
- LUA_CPATH="${lpeg}/lib/lua/${lua.luaversion}/?.so;${luabitop}/lib/lua/5.2/?.so";
- LUA_PATH="${luaMessagePack}/share/lua/5.1/?.lua";
-
- meta = with stdenv.lib; {
- description = "Vim text editor fork focused on extensibility and agility";
- longDescription = ''
- Neovim is a project that seeks to aggressively refactor Vim in order to:
- - Simplify maintenance and encourage contributions
- - Split the work between multiple developers
- - Enable the implementation of new/modern user interfaces without any
- modifications to the core source
- - Improve extensibility with a new plugin architecture
- '';
- homepage = http://www.neovim.io;
- # "Contributions committed before b17d96 by authors who did not sign the
- # Contributor License Agreement (CLA) remain under the Vim license.
- # Contributions committed after b17d96 are licensed under Apache 2.0 unless
- # those contributions were copied from Vim (identified in the commit logs
- # by the vim-patch token). See LICENSE for details."
- license = with licenses; [ asl20 vim ];
- maintainers = with maintainers; [ manveru nckx ];
- platforms = platforms.unix;
+ pythonEnv = pythonPackages.python.buildEnv.override {
+ extraLibs = [ pythonPackages.neovim ] ++ extraPythonPackages;
+ ignoreCollisions = true;
};
+
+ python3Env = python3Packages.python.buildEnv.override {
+ extraLibs = [ python3Packages.neovim ] ++ extraPython3Packages;
+ ignoreCollisions = true;
+ };
+
+ neovim = stdenv.mkDerivation rec {
+ name = "neovim-${version}";
+
+ src = fetchFromGitHub {
+ sha256 = "1lycql0lwi7ynrsaln4kxybwvxb9fvganiq3ba4pnpcfgl155k1j";
+ rev = "6270d431aaeed71e7a8782411f36409ab8e0ee35";
+ repo = "neovim";
+ owner = "neovim";
+ };
+
+ enableParallelBuilding = true;
+
+ buildInputs = [
+ makeWrapper
+ cmake
+ glib
+ libtermkey
+ libuv
+ luajit
+ lua
+ lpeg
+ luaMessagePack
+ luabitop
+ libmsgpack
+ ncurses
+ neovimLibvterm
+ pkgconfig
+ unibilium
+ ] ++ optional withJemalloc jemalloc;
+
+ nativeBuildInputs = [
+ gettext
+ ];
+
+ LUA_CPATH="${lpeg}/lib/lua/${lua.luaversion}/?.so;${luabitop}/lib/lua/5.2/?.so";
+ LUA_PATH="${luaMessagePack}/share/lua/5.1/?.lua";
+
+ preConfigure = stdenv.lib.optionalString stdenv.isDarwin ''
+ export DYLD_LIBRARY_PATH=${jemalloc}/lib
+ '';
+
+ postInstall = stdenv.lib.optionalString stdenv.isDarwin ''
+ echo patching $out/bin/nvim
+ install_name_tool -change libjemalloc.1.dylib \
+ ${jemalloc}/lib/libjemalloc.1.dylib \
+ $out/bin/nvim
+ '' + optionalString withPython ''
+ ln -s ${pythonEnv}/bin/python $out/bin/nvim-python
+ '' + optionalString withPython3 ''
+ ln -s ${python3Env}/bin/python $out/bin/nvim-python3
+ '' + optionalString (withPython || withPython3) ''
+ wrapProgram $out/bin/nvim --add-flags "${
+ (optionalString withPython
+ ''--cmd \"let g:python_host_prog='$out/bin/nvim-python'\" '') +
+ (optionalString withPython3
+ ''--cmd \"let g:python3_host_prog='$out/bin/nvim-python3'\" '')
+ }"
+ '';
+
+ meta = {
+ description = "Vim text editor fork focused on extensibility and agility";
+ longDescription = ''
+ Neovim is a project that seeks to aggressively refactor Vim in order to:
+ - Simplify maintenance and encourage contributions
+ - Split the work between multiple developers
+ - Enable the implementation of new/modern user interfaces without any
+ modifications to the core source
+ - Improve extensibility with a new plugin architecture
+ '';
+ homepage = http://www.neovim.io;
+ # "Contributions committed before b17d96 by authors who did not sign the
+ # Contributor License Agreement (CLA) remain under the Vim license.
+ # Contributions committed after b17d96 are licensed under Apache 2.0 unless
+ # those contributions were copied from Vim (identified in the commit logs
+ # by the vim-patch token). See LICENSE for details."
+ license = with licenses; [ asl20 vim ];
+ maintainers = with maintainers; [ manveru nckx garbas ];
+ platforms = platforms.unix;
+ };
+ };
+
+in if (vimAlias == false && configure == null) then neovim else stdenv.mkDerivation rec {
+ name = "neovim-${version}-configured";
+ buildInputs = [ makeWrapper ];
+ buildCommand = ''
+ mkdir -p $out/bin
+ for item in ${neovim}/bin/*; do
+ ln -s $item $out/bin/
+ done
+ '' + optionalString vimAlias ''
+ ln -s $out/bin/nvim $out/bin/vim
+ '' + optionalString (configure != null) ''
+ wrapProgram $out/bin/nvim --add-flags "-u ${vimUtils.vimrcFile configure}"
+ '';
}
diff --git a/pkgs/applications/graphics/antimony/default.nix b/pkgs/applications/graphics/antimony/default.nix
new file mode 100644
index 00000000000..589d20cb126
--- /dev/null
+++ b/pkgs/applications/graphics/antimony/default.nix
@@ -0,0 +1,41 @@
+{ stdenv, fetchgit, libpng, python3, boost, mesa, qt5, ncurses }:
+
+let
+ gitRev = "745eca3a2d2657c495d5509e9083c884e021d09c";
+ gitBranch = "master";
+ gitTag = "0.8.0b";
+in
+ stdenv.mkDerivation rec {
+ name = "antimony-${version}";
+ version = gitTag;
+
+ src = fetchgit {
+ url = "git://github.com/mkeeter/antimony.git";
+ rev = gitRev;
+ sha256 = "19ir3y5ipmfyygcn8mbxika4j3af6dfrv54dvhn6maz7dy8h30f4";
+ };
+
+ patches = [ ./paths-fix.patch ];
+
+ buildInputs = [
+ libpng python3 (boost.override { python = python3; })
+ mesa qt5.base ncurses
+ ];
+
+ configurePhase = ''
+ export GITREV=${gitRev}
+ export GITBRANCH=${gitBranch}
+ export GITTAG=${gitTag}
+
+ cd qt
+ export sourceRoot=$sourceRoot/qt
+ qmake antimony.pro PREFIX=$out
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A computer-aided design (CAD) tool from a parallel universe";
+ homepage = "https://github.com/mkeeter/antimony";
+ license = licenses.mit;
+ platforms = platforms.linux;
+ };
+ }
diff --git a/pkgs/applications/graphics/antimony/paths-fix.patch b/pkgs/applications/graphics/antimony/paths-fix.patch
new file mode 100644
index 00000000000..de8d9e7beb0
--- /dev/null
+++ b/pkgs/applications/graphics/antimony/paths-fix.patch
@@ -0,0 +1,99 @@
+diff --git a/qt/antimony.pro b/qt/antimony.pro
+index 9d586f4..b055a6d 100644
+--- a/qt/antimony.pro
++++ b/qt/antimony.pro
+@@ -12,14 +12,9 @@ QMAKE_CXXFLAGS_RELEASE += -O3
+
+ QMAKE_CXXFLAGS += -Werror=switch
+
+-GITREV = $$system(git log --pretty=format:'%h' -n 1)
+-GITDIFF = $$system(git diff --quiet --exit-code || echo "+")
+-GITTAG = $$system(git describe --exact-match --tags 2> /dev/null)
+-GITBRANCH = $$system(git rev-parse --abbrev-ref HEAD)
+-
+-QMAKE_CXXFLAGS += "-D'GITREV=\"$${GITREV}$${GITDIFF}\"'"
+-QMAKE_CXXFLAGS += "-D'GITTAG=\"$${GITTAG}\"'"
+-QMAKE_CXXFLAGS += "-D'GITBRANCH=\"$${GITBRANCH}\"'"
++QMAKE_CXXFLAGS += "-D'GITREV=\"$$(GITREV)\"'"
++QMAKE_CXXFLAGS += "-D'GITTAG=\"$$(GITTAG)\"'"
++QMAKE_CXXFLAGS += "-D'GITBRANCH=\"$$(GITBRANCH)\"'"
+
+ OLD_GL_SET = $$(OLD_GL)
+ equals(OLD_GL_SET, "true") {
+@@ -125,11 +120,11 @@ macx {
+ }
+
+ linux {
+- executable.path = /usr/local/bin
++ executable.path = $$(out)/bin
+ executable.files = antimony
+- nodes_folder.path = /usr/local/bin/sb/nodes
++ nodes_folder.path = $$(out)/bin/sb/nodes
+ nodes_folder.files = ../py/nodes/*
+- fab_folder.path = /usr/local/bin/sb/fab
++ fab_folder.path = $$(out)/bin/sb/fab
+ fab_folder.files = ../py/fab/*
+ INSTALLS += executable nodes_folder fab_folder
+ }
+diff --git a/qt/fab.pri b/qt/fab.pri
+index a54813b..b500536 100644
+--- a/qt/fab.pri
++++ b/qt/fab.pri
+@@ -54,7 +54,7 @@ DEFINES += '_STATIC_= '
+
+ linux {
+ QMAKE_CFLAGS += -std=gnu99
+- QMAKE_CXXFLAGS += $$system(/usr/bin/python3-config --includes)
++ QMAKE_CXXFLAGS += $$system(python3-config --includes)
+ LIBS += -lpng
+ }
+
+diff --git a/qt/shared.pri b/qt/shared.pri
+index e7d0e3a..026eae3 100644
+--- a/qt/shared.pri
++++ b/qt/shared.pri
+@@ -39,41 +39,11 @@ macx {
+ }
+
+ linux {
+- QMAKE_CXXFLAGS += $$system(/usr/bin/python3-config --includes)
+- QMAKE_LFLAGS += $$system(/usr/bin/python3-config --ldflags)
++ QMAKE_CXXFLAGS += $$system(python3-config --includes)
++ QMAKE_LFLAGS += $$system(python3-config --ldflags)
+
+ # Even though this is in QMAKE_LFLAGS, the linker is picky about
+ # library ordering (so it needs to be here too).
+ LIBS += -lpython3.4m
+-
+- # ldconfig is being used to find libboost_python, but it's in a different
+- # place in different distros (and is not in the default $PATH on Debian).
+- # First, check to see if it's on the default $PATH.
+- system(which ldconfig > /dev/null) {
+- LDCONFIG_BIN = "ldconfig"
+- }
+- # If that failed, then search for it in its usual places.
+- isEmpty(LDCONFIG_BIN) {
+- for(p, $$list(/sbin/ldconfig /usr/bin/ldconfig)) {
+- exists($$p): LDCONFIG_BIN = $$p
+- }
+- }
+- # If that search failed too, then exit with an error.
+- isEmpty(LDCONFIG_BIN) {
+- error("Could not find ldconfig!")
+- }
+-
+- # Check for different boost::python naming schemes
+- LDCONFIG_OUT = $$system($$LDCONFIG_BIN -p|grep python)
+- for (b, $$list(boost_python-py34 boost_python3)) {
+- contains(LDCONFIG_OUT, "lib$${b}.so") {
+- LIBS += "-l$$b"
+- GOT_BOOST_PYTHON = True
+- }
+- }
+-
+- # If we couldn't find boost::python, exit with an error.
+- isEmpty(GOT_BOOST_PYTHON) {
+- error("Could not find boost::python3")
+- }
++ LIBS += -lboost_python3
+ }
diff --git a/pkgs/applications/graphics/digikam/default.nix b/pkgs/applications/graphics/digikam/default.nix
index 70966196b07..f86d3056db9 100644
--- a/pkgs/applications/graphics/digikam/default.nix
+++ b/pkgs/applications/graphics/digikam/default.nix
@@ -6,11 +6,11 @@
}:
stdenv.mkDerivation rec {
- name = "digikam-4.6.0";
+ name = "digikam-4.10.0";
src = fetchurl {
url = "http://download.kde.org/stable/digikam/${name}.tar.bz2";
- sha256 = "0id3anikki8c3rzqzapdbg00h577qwybknvkbz1kdq0348bs6ixh";
+ sha256 = "4207e68b6221307111b66bb69485d3e88150df95dae014a99f6f161a3da0c725";
};
nativeBuildInputs = [ cmake automoc4 pkgconfig ];
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
KDEDIRS="${marble}:${qjson}";
# Help digiKam find libusb, otherwise gphoto2 support is disabled
- cmakeFlags = "-DLIBUSB_LIBRARIES=${libusb1}/lib -DLIBUSB_INCLUDE_DIR=${libusb1}/include/libusb-1.0";
+ cmakeFlags = "-DLIBUSB_LIBRARIES=${libusb1}/lib -DLIBUSB_INCLUDE_DIR=${libusb1}/include/libusb-1.0 -DDIGIKAMSC_COMPILE_LIBKFACE=ON";
enableParallelBuilding = true;
diff --git a/pkgs/applications/graphics/photoqt/default.nix b/pkgs/applications/graphics/photoqt/default.nix
index 9e2c3a18a63..2d41cfe5189 100644
--- a/pkgs/applications/graphics/photoqt/default.nix
+++ b/pkgs/applications/graphics/photoqt/default.nix
@@ -1,19 +1,17 @@
{ stdenv, fetchurl, cmake, qt5, exiv2, graphicsmagick }:
let
- version = "1.1.0.1";
+ version = "1.2";
in
stdenv.mkDerivation rec {
name = "photoqt-${version}";
src = fetchurl {
url = "http://photoqt.org/pkgs/photoqt-${version}.tar.gz";
- sha256 = "1y59ys1dgjppahs7v7kxwva7ik23s0x7j2f6glv6sn23l9cfq9rp";
+ sha256 = "1dnnj2h3j517hcbjxlzk035fis44wdmqq7dvhwpmq1rcr0v32aaa";
};
buildInputs = [ cmake qt5.base qt5.tools exiv2 graphicsmagick ];
- patches = [ ./graphicsmagick-path.patch ];
-
preConfigure = ''
export MAGICK_LOCATION="${graphicsmagick}/include/GraphicsMagick"
'';
diff --git a/pkgs/applications/graphics/photoqt/graphicsmagick-path.patch b/pkgs/applications/graphics/photoqt/graphicsmagick-path.patch
deleted file mode 100644
index da9b70e31ed..00000000000
--- a/pkgs/applications/graphics/photoqt/graphicsmagick-path.patch
+++ /dev/null
@@ -1,46 +0,0 @@
---- a/CMake/FindMagick.cmake 2014-10-13 19:24:30.000000000 +0200
-+++ b/CMake/FindMagick.cmake 2014-12-27 18:54:19.611759021 +0100
-@@ -19,28 +19,11 @@
- SET(MAGICK++_FOUND "NO" )
-
- FIND_PATH( MAGICK_INCLUDE_DIR magick/magick.h
-- "$ENV{MAGICK_LOCATION}/magick"
-- "$ENV{MAGICK_LOCATION}/include/magick"
-- "$ENV{MAGICK_HOME}/include/magick"
-- /usr/include/magick
-- /usr/include/
-- /usr/include/GraphicsMagick
-- /opt/local/include/GraphicsMagick/magick
-- /opt/local/include/GraphicsMagick
-+ "$ENV{MAGICK_LOCATION}"
- )
-
- FIND_PATH( MAGICK++_INCLUDE_DIR Magick++.h
-- "$ENV{MAGICK++_LOCATION}/Magick++"
-- "$ENV{MAGICK++_LOCATION}/include/"
-- "$ENV{MAGICK_LOCATION}/Magick++"
-- "$ENV{MAGICK_LOCATION}/include/Magick++"
-- "$ENV{MAGICK_LOCATION}/include/"
-- "$ENV{MAGICK_HOME}/include/"
-- /usr/include/Magick++
-- /usr/include/GraphicsMagick
-- /usr/include/
-- /opt/local/include/GraphicsMagick/Magick++
-- /opt/local/include/GraphicsMagick
-+ "$ENV{MAGICK_LOCATION}"
- )
-
- FIND_LIBRARY( Magick GraphicsMagick
-@@ -55,12 +38,7 @@
-
- FIND_LIBRARY( Magick++ GraphicsMagick++
- PATHS
-- "$ENV{MAGICK++_LOCATION}/.libs"
-- "$ENV{MAGICK_LOCATION}/.libs"
-- "$ENV{MAGICK++_LOCATION}/lib"
- "$ENV{MAGICK_LOCATION}/lib"
-- "$ENV{MAGICK_HOME}/lib"
-- /opt/local/lib
- DOC "GraphicsMagick Magick++ library"
- )
-
diff --git a/pkgs/applications/graphics/shotwell/default.nix b/pkgs/applications/graphics/shotwell/default.nix
index 27dde61a08c..94131cbf4ff 100644
--- a/pkgs/applications/graphics/shotwell/default.nix
+++ b/pkgs/applications/graphics/shotwell/default.nix
@@ -13,7 +13,7 @@ let
sha256 = "0fmg7fq5fx0jg3ryk71kwdkspsvj42acxy9imk7vznkqj29a9zqn";
};
- configureFlags = "--with-ca-certificates=${cacert}/ca-bundle.crt";
+ configureFlags = "--with-ca-certificates=${cacert}/etc/ssl/certs/ca-bundle.crt";
buildInputs = [ pkgconfig glib libsoup ];
};
diff --git a/pkgs/applications/kde-apps-15.04/default.nix b/pkgs/applications/kde-apps-15.04/default.nix
index 661c8c3acb5..91583d75ead 100644
--- a/pkgs/applications/kde-apps-15.04/default.nix
+++ b/pkgs/applications/kde-apps-15.04/default.nix
@@ -350,6 +350,12 @@ let
++ [ pkgs.libotr ]; # needed for ktp-text-ui
};
+ ktp-text-ui = super.ktp-text-ui // {
+ buildInputs =
+ super.ktp-text-ui.buildInputs
+ ++ (with kf5; [ kdbusaddons ]);
+ };
+
lokalize = super.lokalize // {
buildInputs =
super.lokalize.buildInputs
diff --git a/pkgs/applications/kde-apps-15.04/manifest.nix b/pkgs/applications/kde-apps-15.04/manifest.nix
index bdf5b3cfc56..d59a3d66966 100644
--- a/pkgs/applications/kde-apps-15.04/manifest.nix
+++ b/pkgs/applications/kde-apps-15.04/manifest.nix
@@ -2548,6 +2548,15 @@
name = "kde-l10n-id-15.04.1.tar.xz";
};
}
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ca_valencia-15.04.1.tar.xz" ".tar";
+ store = "/nix/store/j3xp083a1ggngx4rkbg7jzvci8nmpwkh-kde-l10n-ca_valencia-15.04.1.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.1/src/kde-l10n/kde-l10n-ca_valencia-15.04.1.tar.xz";
+ sha256 = "0gm5aljn22jf5vpanvmhxviyqr3wbi5rn3m6dkx552j2rw2qkazd";
+ name = "kde-l10n-ca_valencia-15.04.1.tar.xz";
+ };
+ }
{
name = stdenv.lib.nameFromURL "kde-l10n-lt-15.04.1.tar.xz" ".tar";
store = "/nix/store/hslbisaanz2z17mvspp4jbsx95pgwsgh-kde-l10n-lt-15.04.1.tar.xz";
@@ -6112,4 +6121,2038 @@
name = "kjumpingcube-15.04.0.tar.xz";
};
}
+ {
+ name = stdenv.lib.nameFromURL "kajongg-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/8j49syr25zv04wxivlj2r50blfkiih8p-kajongg-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kajongg-15.04.2.tar.xz";
+ sha256 = "1ih2gz0i4r1pbx0ys6wi0fgwwh6c5mlq1hy8qfhbb1kanpl0v30k";
+ name = "kajongg-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ksnapshot-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/xbh4flc44pyhmd9wfm14zjr8vz58447c-ksnapshot-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ksnapshot-15.04.2.tar.xz";
+ sha256 = "1zpc9pasw5r68rmkaz8la75hbp9na4114j7w0a9fcgjlvllaij57";
+ name = "ksnapshot-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kfourinline-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/8fnj1fgszjbr1cjcds8wd0bzbyw09zll-kfourinline-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kfourinline-15.04.2.tar.xz";
+ sha256 = "1r53xqvgsvy1las85jccya2xxfk43bwzbzr6lp2vny1624g3vhdc";
+ name = "kfourinline-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "khangman-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/a04bnnsv7r4bhnq3pbsv8nk77749d9vn-khangman-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/khangman-15.04.2.tar.xz";
+ sha256 = "0wpgm0ipm9n6lhyiymf0ncmw8lgz2pc0fh4ghs4n692ihipiw4xf";
+ name = "khangman-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdeedu-data-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/nsxh9zscy67b1srj8asi1jc2x9mdwdhh-kdeedu-data-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdeedu-data-15.04.2.tar.xz";
+ sha256 = "04m14g1b8bkngawjx3x9sdla7p10dhxqwvfv29nkm1lblmc547ia";
+ name = "kdeedu-data-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-runtime-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/cj5sh5gsz4hvg7y5rfjw24bbfrgs133m-kde-runtime-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-runtime-15.04.2.tar.xz";
+ sha256 = "1bcg5g6b8vij6zf1s6y4m5296yqiaavgbfcg1xzfcs8b5l7pckrn";
+ name = "kde-runtime-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kblocks-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/x3j7xjkpkd7v61ismj3ids9m4910yv7f-kblocks-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kblocks-15.04.2.tar.xz";
+ sha256 = "1bpvw5sghg7qiqs97p0xn7b23jgmzk590kmdjcwigfz788ac4ylv";
+ name = "kblocks-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kfloppy-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/76qvy4lfsqyk4qnc1n5cd4wbahfhc6ci-kfloppy-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kfloppy-15.04.2.tar.xz";
+ sha256 = "0r8cgmwa0b9r6dl5vslw4g03mm3qvrswqhk4pdbph3iw1qykxypw";
+ name = "kfloppy-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdesdk-thumbnailers-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/bvgf4ym7568ig6mnk4x3jwcfgx1qp51y-kdesdk-thumbnailers-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdesdk-thumbnailers-15.04.2.tar.xz";
+ sha256 = "048i3xy580gpgbk9m42wv2v0cf1gk2zlx52dvf4izczracsvl2n7";
+ name = "kdesdk-thumbnailers-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkexiv2-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/s6g8walp07ncl0xmkv0lkw5dmykjz49n-libkexiv2-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkexiv2-15.04.2.tar.xz";
+ sha256 = "0nycanbbk50flb92bgk9zddpny8fb74k2b5fb26x33msx04854vb";
+ name = "libkexiv2-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdf-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/2nnqn0syqqm4j4k3z33vx8mhzcis1rx3-kdf-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdf-15.04.2.tar.xz";
+ sha256 = "17mb2hmbm1r0rq5nnh0xmrv3gqcs0ywan8jvxagvli350xgrn2ck";
+ name = "kdf-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-pl-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/81ca4iky2x83laf1wls5v5mvsfvvj9pz-kde-l10n-pl-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-pl-15.04.2.tar.xz";
+ sha256 = "1zs799470abqq9hxgik0wka2im6fi12057jg6id7fi9d58h3lyap";
+ name = "kde-l10n-pl-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ia-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/6l77zbzh2rdrrg3y329i1rbii74dd66f-kde-l10n-ia-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ia-15.04.2.tar.xz";
+ sha256 = "0rg8zwwmwwm373fnsrcj3cdx88c1z674n398kyv3v6xdi31j2f5p";
+ name = "kde-l10n-ia-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-he-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1py0dsvx6lr9ww09qskvx0pdlg82rcjd-kde-l10n-he-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-he-15.04.2.tar.xz";
+ sha256 = "04kayv647nj3hrxl0863gks5z53v1ax9pafncm70ls79rzz95zsa";
+ name = "kde-l10n-he-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-nn-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1sjw15pmf6v8fbrmrrxrp3ifafskhgzh-kde-l10n-nn-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-nn-15.04.2.tar.xz";
+ sha256 = "0j0nn7qk7shq5xi9zma0fl7fibsaindsai8lrvfvaphrbdylp3cx";
+ name = "kde-l10n-nn-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-fr-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qg6j8j8gcx7vglnxyr2f3lnzsrdzvadd-kde-l10n-fr-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-fr-15.04.2.tar.xz";
+ sha256 = "1rgy0qw313wk39f8lxb812kfh7i0b3fqgdz1dv22mpd143ywz0xr";
+ name = "kde-l10n-fr-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ja-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qawjvxq649zk7lnr3wb8kgw93pm9szfw-kde-l10n-ja-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ja-15.04.2.tar.xz";
+ sha256 = "02b3243zbnrkygnbiq7nxrl2sq6ssi27kpn9382aa8b19w96gcsz";
+ name = "kde-l10n-ja-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-el-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/klmfi9iwf6jzg2aq04bg4l011m46snk4-kde-l10n-el-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-el-15.04.2.tar.xz";
+ sha256 = "1y2q5vqm9xkv2yxzwqxrsyqnd8zdfzz5vyza3g4aisawh3xhwq25";
+ name = "kde-l10n-el-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-pa-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/sd55g871lxn0isd486flqhaikaaa00rs-kde-l10n-pa-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-pa-15.04.2.tar.xz";
+ sha256 = "1wi9l74fln9q92l1qmxgb2223gwkb6x2v753mzm7607hbcx9y8dx";
+ name = "kde-l10n-pa-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-pt_BR-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/cklv18g85z9irf5drphwndjpya812yl1-kde-l10n-pt_BR-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-pt_BR-15.04.2.tar.xz";
+ sha256 = "0xfcid4xqcjnlq83ql4rlhb8swn2y9ixzfyx3zbdwjjlkaaqmnr4";
+ name = "kde-l10n-pt_BR-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-sv-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/br5h37sf6ynlvspbn03lifqhwmqbiica-kde-l10n-sv-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-sv-15.04.2.tar.xz";
+ sha256 = "11mnbalw3lpdgv3bbhhh658cs34impi7gymhcw129il0jsc5yz53";
+ name = "kde-l10n-sv-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-is-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/wkxyp7415d8q79wjp8sjkkn9bcf8d5i4-kde-l10n-is-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-is-15.04.2.tar.xz";
+ sha256 = "0xf361dsvlg525w10y1p638ksrb5x381sw322rs14dlpqn89ywl0";
+ name = "kde-l10n-is-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-uk-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/20sv7j17wyswmiwy24p34hgm75wkfiv2-kde-l10n-uk-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-uk-15.04.2.tar.xz";
+ sha256 = "1hbwwj1k4g4z6wkrxd3aalbhvsqvnzgv56s1m748vp7196d7h6wk";
+ name = "kde-l10n-uk-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-it-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/kb9xr7rxa8w6lcrm8yc3nqvvyiwjmzcl-kde-l10n-it-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-it-15.04.2.tar.xz";
+ sha256 = "156j8dj9c44j6mbqka3d0rpkdp2wg5hj7l1kzd2lb0ybvk7vr0r0";
+ name = "kde-l10n-it-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-da-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/7arrlm64k6n3fc4f9glgy8synk5mri64-kde-l10n-da-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-da-15.04.2.tar.xz";
+ sha256 = "1np194cir3wh9sm8pqr4s3sx3k8p4rdndvpx7vgw63jlazrw4rlj";
+ name = "kde-l10n-da-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-zh_CN-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/7x2sq5fhsb84slfylvsg9ds8rkfln7xb-kde-l10n-zh_CN-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-zh_CN-15.04.2.tar.xz";
+ sha256 = "08p3nlyigw1mxqajm2z0gs2ils8aymizmb3iiprnzi3zgcnbg45y";
+ name = "kde-l10n-zh_CN-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-bs-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/s5k7qadd3n5l1zipxylll7qnig20clla-kde-l10n-bs-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-bs-15.04.2.tar.xz";
+ sha256 = "0vlsij3zfbqlcl9xg3iwvyi112d8i00rjbrpwc15lyhw19xzjakb";
+ name = "kde-l10n-bs-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-km-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/crk06pmaf55p78z6pi4fi8hbp0bkf4qm-kde-l10n-km-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-km-15.04.2.tar.xz";
+ sha256 = "1bs10bgnzqwj9adq6xl1y534br74hcvickf2ylw27wqgszwzvd18";
+ name = "kde-l10n-km-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-lt-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/vldyy2rw01z1qbcd256qapbpxwpqa7ci-kde-l10n-lt-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-lt-15.04.2.tar.xz";
+ sha256 = "03vwx16wwihq0qlzs8w1rdlld0951x0yr9w36bvjsrl985n500ip";
+ name = "kde-l10n-lt-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-lv-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/bkr5x2mq2cp5zb950p81hkdjg844zlmw-kde-l10n-lv-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-lv-15.04.2.tar.xz";
+ sha256 = "1skw7d5yxdy7vd2z6fnslcp7xpwjrvxzgl7kd9shvj7px988bfng";
+ name = "kde-l10n-lv-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-sk-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/zzspql9rdl8v5jxajkzg00zz29v9g0wv-kde-l10n-sk-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-sk-15.04.2.tar.xz";
+ sha256 = "1nhvb2kdlxfvch0hly80lm4z17kijy860z2pk23n65r8lmhngf07";
+ name = "kde-l10n-sk-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-kk-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/525xf0fhgxxi9hxy3nlp911a65pwk9v2-kde-l10n-kk-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-kk-15.04.2.tar.xz";
+ sha256 = "0xgncx5xbhnzxzpzaawvj9d19s8zzdrc76qa986xf37zahjv7v1r";
+ name = "kde-l10n-kk-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ca_valencia-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/2qq4c0yr5hpfffwqddcxkqkzp2dr6zcb-kde-l10n-ca_valencia-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ca@valencia-15.04.2.tar.xz";
+ sha256 = "0cg2is4lzy9fxz37ciy3ddjd5z1i2ni8gg5pq7v7hz7fqa8bb3w6";
+ name = "kde-l10n-ca_valencia-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-nl-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/gda3hz81ilizglmrc1m03gy40n1rp89f-kde-l10n-nl-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-nl-15.04.2.tar.xz";
+ sha256 = "0l4frxfrpii14iisjnnpzz0yja6mb6qlz05v1wn6sqqqvv8snq17";
+ name = "kde-l10n-nl-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-wa-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/hm8y22jy2dhnpdhyp0g3m8fz8mf7dhjy-kde-l10n-wa-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-wa-15.04.2.tar.xz";
+ sha256 = "10vzzwhgnxx5rj7h99b63kgpak2mkmdjr7381w7q1iwq816qxxy8";
+ name = "kde-l10n-wa-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-sl-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/193h8asiqnbfnhackzybxbqgwhghsdb2-kde-l10n-sl-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-sl-15.04.2.tar.xz";
+ sha256 = "03chmprkais0cq3z4j9xzy3lq91imf3q4mcaccpknla247a8viqf";
+ name = "kde-l10n-sl-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ca-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/p6h22zlpyglzksa6rb1xc042lmpn0hds-kde-l10n-ca-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ca-15.04.2.tar.xz";
+ sha256 = "00imm41b9769j0pwgcgavdcwmy59qwnab3qkf8xq22899fvadq7b";
+ name = "kde-l10n-ca-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-hu-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/mmdpma42n33irvf9hs4frn1y60q0r4mh-kde-l10n-hu-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-hu-15.04.2.tar.xz";
+ sha256 = "1ilhnp6x3lahhc0rkhn2zv6g9ck8w7b9qaw8fgqkiz0n19hv564f";
+ name = "kde-l10n-hu-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-hi-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/sgcdmfnga8nmyg1pq19cjn5dzdm14c6g-kde-l10n-hi-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-hi-15.04.2.tar.xz";
+ sha256 = "1yqk7wva2r6smasgxzw6f1pw43z1jddf4br1rzq3k7f18np89im7";
+ name = "kde-l10n-hi-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ga-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/sf5s50gzjamhmzvbdsymscm0y63k1vsk-kde-l10n-ga-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ga-15.04.2.tar.xz";
+ sha256 = "0wn2q9vbaqkhb60q7x70b2j3yh8k21y4isk5js2ardzz1gpzmrxk";
+ name = "kde-l10n-ga-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-hr-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/5wri2078sl0r7xv1j2b8x182v2ilpny1-kde-l10n-hr-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-hr-15.04.2.tar.xz";
+ sha256 = "0r5hfhdnjj9j0zzs6yr7a6hc1aidki5far9njn88c78ialw4y9kn";
+ name = "kde-l10n-hr-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-gl-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/970bcajr5cmcq01z4pkglgw9dpwigpz3-kde-l10n-gl-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-gl-15.04.2.tar.xz";
+ sha256 = "1mnyc9ms863s3x6l85kfglz7q8h9faqgkv7vcf8qfjs1vs6qbh6x";
+ name = "kde-l10n-gl-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-es-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/60k5g06hvgpx407f6zbd1q5jm12rzqwv-kde-l10n-es-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-es-15.04.2.tar.xz";
+ sha256 = "1clrjb4wgwx8ijykrdylfgscwimkawpaq13a32m6dka4ipk58399";
+ name = "kde-l10n-es-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-pt-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/vrhsyhk9sz6117hgbjgy6498nvcprxdd-kde-l10n-pt-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-pt-15.04.2.tar.xz";
+ sha256 = "0bkdm2skvkaqspfq7rsqwahm6h17j46fd97wkqrkmdswgnbn14fw";
+ name = "kde-l10n-pt-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-bg-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/w9nhhcra2rjpjsc6apgfrlzwqgp7sx77-kde-l10n-bg-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-bg-15.04.2.tar.xz";
+ sha256 = "1jap82rz52a43rad33hidsyvvzm3s4ma5yk75clv5f8fhnjc946k";
+ name = "kde-l10n-bg-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-fa-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3lqnb375jd1z7ky7y8nrnpgx93ncassv-kde-l10n-fa-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-fa-15.04.2.tar.xz";
+ sha256 = "0kb7lxvgbdwlyi1rli7xrk4ykdnljdcm0clkgl1bla6vgxhlc7mj";
+ name = "kde-l10n-fa-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-id-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/2xsadiy29hblc06v6n3ax9y72k2a32vi-kde-l10n-id-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-id-15.04.2.tar.xz";
+ sha256 = "1vadznjjy32brc76d2wzq31xf69dq2fxipg8rhvjh2f8cy068blf";
+ name = "kde-l10n-id-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ar-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/h7838chap1cxjw66pw6914jpl48n6knf-kde-l10n-ar-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ar-15.04.2.tar.xz";
+ sha256 = "05wspvz4fk6xy3d9zjgrj7kzj213hhkv7fvs43iy2l4vm8b3vski";
+ name = "kde-l10n-ar-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-de-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qzx5vs924pzqyxj6mxmn3p9wq0q05vw1-kde-l10n-de-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-de-15.04.2.tar.xz";
+ sha256 = "0fvb169pl9ibppiinc2sq164i7cikn7qxvycdv1whk3bcv376rrh";
+ name = "kde-l10n-de-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-eu-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/6rs8knkgfs23qa2cwm5s9yp661z37ws1-kde-l10n-eu-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-eu-15.04.2.tar.xz";
+ sha256 = "18bry21g828n0rvaq4510pj8fb4f49jn5yxvf1jm6qn3wcfg5qws";
+ name = "kde-l10n-eu-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-en_GB-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1kl0887wqmnvhiw9318ihvfwwdkxjhrj-kde-l10n-en_GB-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-en_GB-15.04.2.tar.xz";
+ sha256 = "10db8pnbbxc35shx0f7vfiz0glm9kb521b99iksjkwnxpss9kyvx";
+ name = "kde-l10n-en_GB-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-nds-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/h8r3j2113d0h034vbgz0d61ybnicc5g6-kde-l10n-nds-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-nds-15.04.2.tar.xz";
+ sha256 = "0ryjlw2d9lrzzf08v1vscjr6mp2ckpbd0f2hkxg0ck8wgn7c2mxd";
+ name = "kde-l10n-nds-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-fi-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/namy5fby5nck67cdgk4ywb7khd43cacr-kde-l10n-fi-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-fi-15.04.2.tar.xz";
+ sha256 = "0zpkcs64g5si5r5q075vkva41sx39qp30hycdzhvbs72hkjkp6m8";
+ name = "kde-l10n-fi-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ro-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/zyb7zb7w4y79s5kl6d2p5awpbn3912mv-kde-l10n-ro-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ro-15.04.2.tar.xz";
+ sha256 = "05pgpshvs08inygighi3ya0bl49238l96sgqql0377cm9cw2hj9l";
+ name = "kde-l10n-ro-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-mr-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/cy7mih4b17vvbfmw86n6bl103xcixhpv-kde-l10n-mr-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-mr-15.04.2.tar.xz";
+ sha256 = "1clmi1vflqi63kihv9ljkbns4r0v7yb65zkdv642kdcfmwz9kgw8";
+ name = "kde-l10n-mr-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-eo-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ngffzrfy1r1x9rlx1h6ivfhif79g6fpx-kde-l10n-eo-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-eo-15.04.2.tar.xz";
+ sha256 = "020zq1ygjkpx5y2isqqp3chk0s1jcd29zy6fwr6jyxvj0260fa8q";
+ name = "kde-l10n-eo-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-cs-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/l46m8w2hl6wrdns1qwvm5hd4dlbyxpkj-kde-l10n-cs-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-cs-15.04.2.tar.xz";
+ sha256 = "0ks75clbhywql9pgchxi5phc50n9qama5v4crngwkxfbs2lhp05d";
+ name = "kde-l10n-cs-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-zh_TW-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/7q7ws7qcbnrm5ivxiq1kdfjih1aa44g1-kde-l10n-zh_TW-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-zh_TW-15.04.2.tar.xz";
+ sha256 = "1gvr4k48qjwgw9qsv3rlz210slqdvsxvqxwsy7j5ndcjfs2724wi";
+ name = "kde-l10n-zh_TW-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ru-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/nzql394zszp4wan26pr336i20ipirh9q-kde-l10n-ru-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ru-15.04.2.tar.xz";
+ sha256 = "155mbg25anmdy6vgz3fsn4p8m7c8syfwiy70jsgqv9751dvkajlk";
+ name = "kde-l10n-ru-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-tr-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/z0ncv2c97if41g7qln16vx9kr166zvc5-kde-l10n-tr-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-tr-15.04.2.tar.xz";
+ sha256 = "1ddbxlf9bqd3zqwxfhygfmy15prhh0albp83saprk94bbdirp0lq";
+ name = "kde-l10n-tr-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ko-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/s8sr6jzaydgc64r1dbgqzns682avkd7p-kde-l10n-ko-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ko-15.04.2.tar.xz";
+ sha256 = "1knsgxhgz0cvxk0y460zyzk5n9q0rk8p3cdf0wlpxf7z8wvxcab0";
+ name = "kde-l10n-ko-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-ug-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/rsdm9ds9pn5iqsk6dgbr6mnpliisby3c-kde-l10n-ug-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-ug-15.04.2.tar.xz";
+ sha256 = "0ck01ygnz7ycfpff7g2zyix0zv19ia8csmggvyv07lp0k84asxr1";
+ name = "kde-l10n-ug-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-nb-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/5dhk16y2w9sibzqlv50w5d18js7mjrpf-kde-l10n-nb-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-nb-15.04.2.tar.xz";
+ sha256 = "16ya60pxn30rpwidijcycmjxm8c61hiykzfirba73i0pkzq13nij";
+ name = "kde-l10n-nb-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-sr-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/cpfz2g7z1al6p5yadjj6y314ws0fmpg4-kde-l10n-sr-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-sr-15.04.2.tar.xz";
+ sha256 = "1pwwvj7s6ivmx6c5gh6dvfrvi5xp66b40fsnn04zwsp0iamxkdqi";
+ name = "kde-l10n-sr-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-l10n-et-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/7n1ka8pz70xfznm3q3qvmcbrr74yb6by-kde-l10n-et-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-l10n/kde-l10n-et-15.04.2.tar.xz";
+ sha256 = "1w08blhf6adlj0yanfac2b3kk0ag3gbazjdywz9cf21ks6ni6bsn";
+ name = "kde-l10n-et-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkcompactdisc-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/lniq3v7dr7wqagi4c7cjwdig0ds5bndp-libkcompactdisc-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkcompactdisc-15.04.2.tar.xz";
+ sha256 = "14qryxim0fhx7npbicv1pvkr42544jzplfmng7z2cjxx4c636j9v";
+ name = "libkcompactdisc-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ksaneplugin-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/v1mywghcpyff25izr0iimzyr9vh3pfnj-ksaneplugin-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ksaneplugin-15.04.2.tar.xz";
+ sha256 = "0s69h4swdcxagv45v8y0kbg4ik3pyl7asiryvz9dip7yznwlxlz9";
+ name = "ksaneplugin-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kamera-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/s9h0gx53bwvg5f8z34drzwkf0ybg602h-kamera-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kamera-15.04.2.tar.xz";
+ sha256 = "01r16868mdmpfjwzz7wa1qykc6lif9yi7fp0zxyk5hy77wp4jwdy";
+ name = "kamera-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kubrick-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/scjxw225n4i6s702ggd5mnblyfgaf9sh-kubrick-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kubrick-15.04.2.tar.xz";
+ sha256 = "16ndnx92mb307qjkwljdbgp69aamk268yqn2w9w8y4yjhmvsmx3d";
+ name = "kubrick-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "jovie-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ja9lwsb9crzqd8q5vnhw66f5ianimzg7-jovie-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/jovie-15.04.2.tar.xz";
+ sha256 = "0lc751p2s96qjqh7dccjm498m7c370dcsm5bxqks9imyi9l7syyx";
+ name = "jovie-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ark-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/cbpf87yihk31gjc5glvfbsb1r470n0zy-ark-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ark-15.04.2.tar.xz";
+ sha256 = "0pssyyk8kf0qy9vh71kx3h5f1fs26k21cql97mfsl4hz181mfxkq";
+ name = "ark-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdiamond-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/cdw9y1cx7gjfsj6b1hd43mmjjd2k715d-kdiamond-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdiamond-15.04.2.tar.xz";
+ sha256 = "1k0w2d0ysvwhvmsn0smi1s5dwrcwdnqfzny5dgblc3p62xw1wm1j";
+ name = "kdiamond-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "klettres-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/x4147vkla2llia02yj1m1rrjs425lm4a-klettres-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/klettres-15.04.2.tar.xz";
+ sha256 = "1rmf5hpc9zwaham157xzn3dvh0z6scpr2i38i513b0ji0kdizikc";
+ name = "klettres-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "bomber-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/9w7iv272z8lkpp66di0l0f3z79hjvahg-bomber-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/bomber-15.04.2.tar.xz";
+ sha256 = "1xn52p5apfbm3iyjq1hw2mg5isl3jcbq4x8wfzil2vp3ir16f1j3";
+ name = "bomber-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "superkaramba-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/gsrfn2v5lli7fykmq0864j95mxkdn22r-superkaramba-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/superkaramba-15.04.2.tar.xz";
+ sha256 = "1x8kxj2ndpnpfbxk33rqyq64y1chlll8j3331skzss9117fsp7z1";
+ name = "superkaramba-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkgeomap-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/fsr2vij54z8zwj9rzgfy1x22ivcs2i3s-libkgeomap-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkgeomap-15.04.2.tar.xz";
+ sha256 = "091jl7zdcvj91xqr6fh8vvn5wrbg86ykczj43lgvnnph28h1xpyh";
+ name = "libkgeomap-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kteatime-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/fqm7q93457lrg91b5w8jr2lfx3ypa18p-kteatime-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kteatime-15.04.2.tar.xz";
+ sha256 = "0cpy6z6nxys307247l9rcms9f4n2qpnvij1c20s0bcb03n5ya0vp";
+ name = "kteatime-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "granatier-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3flm8w829k0ygcs24j5smhsq69r1isdp-granatier-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/granatier-15.04.2.tar.xz";
+ sha256 = "1jcxnm1hy6s6g6yls8ljcrhhp3qsp58gcs46hy4s25nacx5m4kh6";
+ name = "granatier-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkeduvocdocument-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/aj12ls0r62c66f0gv1w0dv37a9wbx0mm-libkeduvocdocument-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkeduvocdocument-15.04.2.tar.xz";
+ sha256 = "13hzs4lrlrnyya3321iqky2nxjlh65fs2lr0nbl3g6k9wxdxlqfw";
+ name = "libkeduvocdocument-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "blinken-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/nh2kasqpz3iwhc2hwv6di51vp7xnnfd3-blinken-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/blinken-15.04.2.tar.xz";
+ sha256 = "1k0idsbqnhmrlnsl8l45wkipb6hch1imrkxglxl1xw0pr0s7c8rg";
+ name = "blinken-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kpat-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/hasm2996yj2yljjc6wk50naqm1bal8mh-kpat-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kpat-15.04.2.tar.xz";
+ sha256 = "0vhrq3ssfqwpkrx355v91gg1kdl8sjfpkp4fqyi9h36nps7qdiqj";
+ name = "kpat-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kapman-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/wfi3wjr0yyn72aqh31hvfinghl73z7ay-kapman-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kapman-15.04.2.tar.xz";
+ sha256 = "1jxxs2ljfci9llfv1pyybrw10nbajk06k8yhw4yswn23j544049a";
+ name = "kapman-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kscd-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/vzwm2r7kypa7vmvxldsqmm27gw0a7bl8-kscd-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kscd-15.04.2.tar.xz";
+ sha256 = "1066yavabxax059fwgp0rmspfsy065x0nisci0ybyfh0y9m8m48j";
+ name = "kscd-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdelibs-4.14.9.tar.xz" ".tar";
+ store = "/nix/store/5wy5pdqpd3c3zhwm93dnasw605abglz3-kdelibs-4.14.9.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdelibs-4.14.9.tar.xz";
+ sha256 = "07klv3hxgq1w85lx2myw131r4v3fd726fljipkd7arwzp8mbwcix";
+ name = "kdelibs-4.14.9.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdepim-4.14.9.tar.xz" ".tar";
+ store = "/nix/store/bskv830n49z3ib444qh1vb87d712q0iw-kdepim-4.14.9.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdepim-4.14.9.tar.xz";
+ sha256 = "0l4nfcf0k958w37bzmbfpvs96yba0r22q16z4d1ksqbyrr6v7ycf";
+ name = "kdepim-4.14.9.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-wallpapers-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/p0n3h5a2p5wh5l31ldn2cslbvfbvlwl4-kde-wallpapers-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-wallpapers-15.04.2.tar.xz";
+ sha256 = "1qcj8qdryqsqv430bmzv0hir7gbqbfw9sc3x7i4692h8cwvzkw5d";
+ name = "kde-wallpapers-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kmix-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/sdwpx6s19zjckj3lgzc5isiab0cigy8n-kmix-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kmix-15.04.2.tar.xz";
+ sha256 = "0g601dmd7f0j70y50xkw4y8vpb5xgjz938m266sklkkwjdcf2fg9";
+ name = "kmix-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "krdc-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3x1axf8f8qcpg3898r90yi35sh06vsh6-krdc-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/krdc-15.04.2.tar.xz";
+ sha256 = "0m7jmwrzihzm8iswzvw5ajz4yiaxdsprdkhgl1a59hgm7wgrp8yg";
+ name = "krdc-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "konsole-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/h70w08hzqsnp9rs11mr5m7yizc8yzdgw-konsole-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/konsole-15.04.2.tar.xz";
+ sha256 = "1cy71kfv1f9bq3y3n73brm6wzl03qgcvx5rg0kflx3ihjl1aclgc";
+ name = "konsole-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kanagram-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/73v4cznbqfpidrdg6gbra0qlpf43hb3q-kanagram-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kanagram-15.04.2.tar.xz";
+ sha256 = "1zqjms2ai4bpfmbf136q94gbl59vjszlfsp8xi0pmpp138yii9a8";
+ name = "kanagram-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "umbrello-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/va7y8idm0hjzhfhicl6xlsyz61cp37gz-umbrello-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/umbrello-15.04.2.tar.xz";
+ sha256 = "08bz8lg2arrwsnf0gjjjrf6bihrv9bdz8n4hdvilhpy0ls78v2va";
+ name = "umbrello-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktux-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/6rn0kw9p0vxk4hd60l6ksyxrlczksbac-ktux-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktux-15.04.2.tar.xz";
+ sha256 = "0pdgbqbk3iwjywvhm6bzwqc6acfnyjixj2j3yxczn2k6fy5k0vkf";
+ name = "ktux-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "krfb-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/70w7yfkg79g199z7sb5nk3xaknwjirwm-krfb-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/krfb-15.04.2.tar.xz";
+ sha256 = "1ynvwvhkshjrh1d1rifawzwv0srqj9wlqhhiv5nr8lwd4m29pdj2";
+ name = "krfb-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kwalletmanager-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/59i6az9vcq1b9vqx9rwibv7i0iwj2wc5-kwalletmanager-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kwalletmanager-15.04.2.tar.xz";
+ sha256 = "0wch3bm2c7xjbrjvn1ka3iyawi6h6snfab7dzp6na8n4ck7y9s4p";
+ name = "kwalletmanager-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "palapeli-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/kigl3wjr17nq1mh6wqfd3kc4sbh8dqfm-palapeli-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/palapeli-15.04.2.tar.xz";
+ sha256 = "0jsgbddk631z010dam8khbcq9qphkgax9rbgn26r9cv29cfd0h5j";
+ name = "palapeli-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdenetwork-strigi-analyzers-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3r1ibr6rqz6lmgxxscgbkx7ffkpiad0y-kdenetwork-strigi-analyzers-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdenetwork-strigi-analyzers-15.04.2.tar.xz";
+ sha256 = "13bc2a1m64k6iki12kpynf3f1wijxch8rg9nn7xc8rl3bjms8x9k";
+ name = "kdenetwork-strigi-analyzers-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "gwenview-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/zv987ag77hm9wx1gk7nqrrk629dr1q4m-gwenview-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/gwenview-15.04.2.tar.xz";
+ sha256 = "1c1fqwgq91s0c9f85g3i3dwaq16r260jj4wx4xcr3qi4bm12lq5k";
+ name = "gwenview-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kruler-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ps63vs05fy6jk669grmm3ddb5f0hl00m-kruler-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kruler-15.04.2.tar.xz";
+ sha256 = "0rl81v1lhljfqvz98zfvnfbnylxn3l9qzy7b33hfkpmm9bjkp0i2";
+ name = "kruler-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "knavalbattle-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ajmnqxshv1vg44acwgyy1k3l5fjiadga-knavalbattle-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/knavalbattle-15.04.2.tar.xz";
+ sha256 = "15pmbj230rhiyxx2cz1wsx29zp0p4my54i8099yv943w8wswwy8x";
+ name = "knavalbattle-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kgoldrunner-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/j9gqvnw6d4qaf09vsiinzdnpiy3nrgl4-kgoldrunner-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kgoldrunner-15.04.2.tar.xz";
+ sha256 = "1x5pza747k69wx54fiparqx43pk112cma2pq6c4ndycrm5lqxg5v";
+ name = "kgoldrunner-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kmag-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1cz44lqkfc63qgxap5qi59qviwrszif9-kmag-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kmag-15.04.2.tar.xz";
+ sha256 = "1kbxhq9mfjxswds60pa6v1ixc8grn0m1f84da7s18ph5r1wdpkr3";
+ name = "kmag-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-send-file-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/x1p55ssi0cx67z1q2pbqkzaxpaps3lv6-ktp-send-file-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-send-file-15.04.2.tar.xz";
+ sha256 = "1jygvxc8ajy6p6qhpfwj0chc0571x50h7n2nzwqiz3nhs3avqxnx";
+ name = "ktp-send-file-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdesdk-strigi-analyzers-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/jma476qyvnw2qr4fhsx0kdmif55inr4p-kdesdk-strigi-analyzers-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdesdk-strigi-analyzers-15.04.2.tar.xz";
+ sha256 = "0wbm6q02zkqbvcq716v468mjxw3zd8xcjqyc3vvz80zfgpbm2dnd";
+ name = "kdesdk-strigi-analyzers-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-text-ui-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1c0qqm7946lgjk4p8am0dd54x9q59jdk-ktp-text-ui-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-text-ui-15.04.2.tar.xz";
+ sha256 = "15kh8jwysvzlxrp4r4vhnla0lmwpxcyaf3gyy2lz0lb1k2k368n4";
+ name = "ktp-text-ui-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "dolphin-plugins-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/5cxhms6vyqxx75cqv6b0899585hq06np-dolphin-plugins-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/dolphin-plugins-15.04.2.tar.xz";
+ sha256 = "19hyki0k06bma2a236w45hip6gb8fzwcm51qx8xxbii4di6qrkvx";
+ name = "dolphin-plugins-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kjumpingcube-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/41gx49qgr229s409f1nfjv0s0xc0rr7w-kjumpingcube-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kjumpingcube-15.04.2.tar.xz";
+ sha256 = "04c0klbgsnp6brf8zml8sz6iyi9m7gidwpgdzrrnnhzwfpgaf9zc";
+ name = "kjumpingcube-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-desktop-applets-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/676j87fj0mj0aqyz62729l7fwnl3dvnm-ktp-desktop-applets-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-desktop-applets-15.04.2.tar.xz";
+ sha256 = "00jlhfm7sbg73y9zbkjicz7wr8740qi3ifm493m2f37cndljllhn";
+ name = "ktp-desktop-applets-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkdcraw-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/nkjk53cfw4lm95jgwxvccsk4ln4dp5yx-libkdcraw-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkdcraw-15.04.2.tar.xz";
+ sha256 = "1j277ydzn35hzk5v0vf50giw1j3yibskpkb4kr5kirszs8m2yqkf";
+ name = "libkdcraw-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kcharselect-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/x07k1rddjvi45jdbn6r1bgrc8a6pcbn5-kcharselect-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kcharselect-15.04.2.tar.xz";
+ sha256 = "084qzv8x6262xsl5n4ynkm3zsqf2wdlj5gn4y9jql7in1b92w293";
+ name = "kcharselect-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kgpg-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/x5w1brmq7c4jkfx2dj335akvc7bqwhkv-kgpg-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kgpg-15.04.2.tar.xz";
+ sha256 = "1z3p0131hvnj3mm53n3q1hdkpvi77x1k8gv1bi3wblqin41dgmfx";
+ name = "kgpg-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "signon-kwallet-extension-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qf4pgkwm97jp6m634xaagz95l371qzrm-signon-kwallet-extension-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/signon-kwallet-extension-15.04.2.tar.xz";
+ sha256 = "0bp1j0hc0a7lwmzi97hymd83vb5x8ks4m4a1k3h2h86wq3gnnfyj";
+ name = "signon-kwallet-extension-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kshisen-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/l868j4vsnxzdjxx4albmff4532pk5x5y-kshisen-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kshisen-15.04.2.tar.xz";
+ sha256 = "0syx9x96zm4hlmpz644sn2rfb4phyzrgvcr0kl38l9aj1i56q81a";
+ name = "kshisen-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "lokalize-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/jxqly6p40ss9aprr12zmabghxphhid17-lokalize-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/lokalize-15.04.2.tar.xz";
+ sha256 = "1hj36k0arfqbyyxccbk6n9skc38a7g6vs3l4r0pdz40b4s65l4hz";
+ name = "lokalize-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kaccounts-integration-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/b7ckd23lzwf8xhrc6qpmyrha6dibk5k2-kaccounts-integration-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kaccounts-integration-15.04.2.tar.xz";
+ sha256 = "1586bv0h98rqbigrcsqx51nvzxk0zzxvqcxgncnjxknn4rhdkk86";
+ name = "kaccounts-integration-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-contact-list-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/7kn6vi1rmf7nddb0xcy3njyf0fhzgicy-ktp-contact-list-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-contact-list-15.04.2.tar.xz";
+ sha256 = "10zjv2imp03p2wh9vj217skx5fmmscb5l8nwlcv7mlh0b74mlx5n";
+ name = "ktp-contact-list-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kremotecontrol-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/acyvv1x0q022axz5l6xz65cs54xqpq4q-kremotecontrol-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kremotecontrol-15.04.2.tar.xz";
+ sha256 = "0npdbdjcfa8y7lmzl80fgbvv94hj2v0fc1lfmii0k0xnb6jv8cvl";
+ name = "kremotecontrol-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-workspace-4.11.20.tar.xz" ".tar";
+ store = "/nix/store/kfm7vk5zlq9rpak25j4gkdaw1hsq6ap5-kde-workspace-4.11.20.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-workspace-4.11.20.tar.xz";
+ sha256 = "06n4aq0mi36d1ssqbvwxgy6jc18q70xp772i58ni0akw0ckrp33c";
+ name = "kde-workspace-4.11.20.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kalgebra-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/jvkznsklm87lnyvwkvn06wzp7irzlj80-kalgebra-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kalgebra-15.04.2.tar.xz";
+ sha256 = "1h8rpikyigx9804pn0624g83ja1wlb2m4hfc29jpi4j6va4h8j4f";
+ name = "kalgebra-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kmplot-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qln1l2y7b5nnwnvgis2ms2cp4iqz7672-kmplot-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kmplot-15.04.2.tar.xz";
+ sha256 = "0p1qkhmdn7wqggk1z4c8mwbgrk7daxgfjg6yhhscaj13ikg2l4qc";
+ name = "kmplot-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kate-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/vzxl3wf0dr7rnzb2xr9pkbdwirjryrv4-kate-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kate-15.04.2.tar.xz";
+ sha256 = "1llsg7ywl9mwl4gc25vw44v708r9k960c2lgqkfjpxnxpjlwk5vp";
+ name = "kate-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kwordquiz-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/a2rnncjw6jn5si9pjcg4gv3fy0fd9pd8-kwordquiz-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kwordquiz-15.04.2.tar.xz";
+ sha256 = "0irs4nchd0fwxvv4c9wxww6vbi97ffz4rihwg1p5jipcad2l13ch";
+ name = "kwordquiz-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kbounce-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/707rjgg0a9m8bpizypgkzp1g09zyd1hh-kbounce-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kbounce-15.04.2.tar.xz";
+ sha256 = "094cwq972h36mznl9snc52248vag1myxlndykagv13kdj7jwynx8";
+ name = "kbounce-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "marble-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3cr2qy4k771c14nfm98zmash1s6p8f0c-marble-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/marble-15.04.2.tar.xz";
+ sha256 = "1jwh0vqdzj7r039pg84rh6jk4dznyanirv286v8anf23s3mjwf6a";
+ name = "marble-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdepim-runtime-4.14.9.tar.xz" ".tar";
+ store = "/nix/store/h1g3dk80b67dqbx33zg1v3wb9141ic2j-kdepim-runtime-4.14.9.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdepim-runtime-4.14.9.tar.xz";
+ sha256 = "0h6q08j5i2lhvlv92daxdyf7vncisbx0ya11vh45wmbv30xv2cl0";
+ name = "kdepim-runtime-4.14.9.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kiriki-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/7sp21hpwl9dbr9h4nqn6xpmqb74zvmcc-kiriki-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kiriki-15.04.2.tar.xz";
+ sha256 = "0sdpswz6gvk03sza5n7n9kf6xi0p7azkgkn27hn0ydh5fm7rfi98";
+ name = "kiriki-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "okteta-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/lzis9waz781v2n789qy6cc5za4xxb6hp-okteta-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/okteta-15.04.2.tar.xz";
+ sha256 = "00y3kcl57crwkycd7ahf9cw20bnjwzjrxnlkvdpqansmcqvmmih5";
+ name = "okteta-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "amor-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/g5a3dbqpf454c7lxi1k1r5d2sgdicl8q-amor-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/amor-15.04.2.tar.xz";
+ sha256 = "1kbdarrf2jxr5f458m28fg19g29xpj5n7fb9w2311052xaywf0rr";
+ name = "amor-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-approver-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/wxfmvnsjxnaiiflbcc7v38h2ax27m5fi-ktp-approver-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-approver-15.04.2.tar.xz";
+ sha256 = "1qik158frx7208adk7r573a85y8xjd1q8r9yw4fb592hvlkdk3i7";
+ name = "ktp-approver-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-base-artwork-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/wdi23i8hk6c4fnvkw6bs75s8jkc0wxc0-kde-base-artwork-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-base-artwork-15.04.2.tar.xz";
+ sha256 = "0if4i3zag7hzgrf89bswfg7c95m066phjs89fk4ss45ak25rgddy";
+ name = "kde-base-artwork-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdepimlibs-4.14.9.tar.xz" ".tar";
+ store = "/nix/store/75yrqw2cr3b7kv1hsvlz4m9j6gm36akk-kdepimlibs-4.14.9.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdepimlibs-4.14.9.tar.xz";
+ sha256 = "0mjbaszc14ilvcjmr7aqy41py7yfriz1glvwpbr89z9nqjvy62yj";
+ name = "kdepimlibs-4.14.9.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kstars-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/mqk73kl61afzbysc7isfli9ashgl29j9-kstars-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kstars-15.04.2.tar.xz";
+ sha256 = "01mzd0qbfjx6fzbaii6al6r62frygf9psi4av1227p3drwmnxrz6";
+ name = "kstars-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kaccessible-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/yrs4k4mal8rdpy1781jblbapf9xz201v-kaccessible-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kaccessible-15.04.2.tar.xz";
+ sha256 = "1aa4c5r0bm0azm8dhkvnrk87669vp397xzz0v0d3ih7ffmh72il1";
+ name = "kaccessible-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ksnakeduel-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/0zkd1qcv6k52avkv235108rrqn2fifd8-ksnakeduel-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ksnakeduel-15.04.2.tar.xz";
+ sha256 = "1zzwkc6k6315a02il4sp4zswz0i1031bcvsvxrpxb45s4rqhds3b";
+ name = "ksnakeduel-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kalzium-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/l50svmrk7acq79f1ab284q61jm1164li-kalzium-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kalzium-15.04.2.tar.xz";
+ sha256 = "1mcfw1l0qqzr212ysgppva8s4dn3dfhzqh712fc3kd416azz985x";
+ name = "kalzium-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "oxygen-icons-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/wlna2q3x6crc3xj7a7x09r0fxzsxfl27-oxygen-icons-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/oxygen-icons-15.04.2.tar.xz";
+ sha256 = "1xwa8y6alrk6faf6bw3wc0y2vxjx32wzl9ncywisb4823xc8njbi";
+ name = "oxygen-icons-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "cervisia-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/h9i6iisfnqyz340z2izl02n8nyz2l82b-cervisia-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/cervisia-15.04.2.tar.xz";
+ sha256 = "10a6k6x5mxcp3ark71rjcsbvi9q7r7sqc0pqx6wqg8wrvqng776i";
+ name = "cervisia-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kmahjongg-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/yhhpl1hamlamb7kfi1njlp60fg59xiqn-kmahjongg-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kmahjongg-15.04.2.tar.xz";
+ sha256 = "17jlb1nr2i79s4m3srv0fm4zwqqknabfa0zwb6y5bdlk9bjpphaq";
+ name = "kmahjongg-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkdegames-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qffj5v8rmrlnqm7y7l68kwhy4cx9hhqa-libkdegames-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkdegames-15.04.2.tar.xz";
+ sha256 = "0r3mnbc4ka8whmdjadnr6wyac4bwfv6w01l6nm2k7gsq2n38q2yj";
+ name = "libkdegames-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kspaceduel-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/zsrxzn4zp9a4v9xfaqr27d4nnmgycdc2-kspaceduel-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kspaceduel-15.04.2.tar.xz";
+ sha256 = "07pgrdywj0jbvqw21qkblax30jym9x8y94ig5jn3jl19ax7a8wqy";
+ name = "kspaceduel-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kmouth-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/pybi47055hcdlpliqari9p8gki1yj8iz-kmouth-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kmouth-15.04.2.tar.xz";
+ sha256 = "1hjn1fb5c7a5yw0yzsb7v3wdgq1wyqj7zs7jw71gsgkq3sy0as47";
+ name = "kmouth-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-dev-utils-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/2y66l1759ipk2dk46b0imh1r6vwb3yrx-kde-dev-utils-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-dev-utils-15.04.2.tar.xz";
+ sha256 = "100kia4fd6gc10mh1nmadrm60wwnciyq5nlm0m4c1cjbp9ypyfh5";
+ name = "kde-dev-utils-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "mplayerthumbs-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3ywzsbp1lvq98ikalwlxs57x9w2zh47x-mplayerthumbs-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/mplayerthumbs-15.04.2.tar.xz";
+ sha256 = "0lgag714pqpqnf6v9dz5xlriswcyqvjnj309gk0wji523hny3mim";
+ name = "mplayerthumbs-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "konquest-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/sqjrx2z8pig68sfifdcykksys2kifi2h-konquest-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/konquest-15.04.2.tar.xz";
+ sha256 = "1w03w8nxkbz9ng2spa3pc5gmigajm7k8dcz2j1nly44a6g85rxnn";
+ name = "konquest-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kcolorchooser-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3cz810cqihfw4jyfi8bdg9fi5bzs1rga-kcolorchooser-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kcolorchooser-15.04.2.tar.xz";
+ sha256 = "1hypa5q9vfk3imc6fng7li3jkh51phsk2cq1sjri1czl547ij38h";
+ name = "kcolorchooser-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ffmpegthumbs-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/fzz2pwgl8jx0flydbv67f494rqs2lrdd-ffmpegthumbs-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ffmpegthumbs-15.04.2.tar.xz";
+ sha256 = "122mfd85yzkmyg1wzz7fz4v0jnxxifinckc9rb5ydjlj3c85y9qg";
+ name = "ffmpegthumbs-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "print-manager-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/zfiqwh08ccppyzvqd8wrlmc0zf7nbj54-print-manager-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/print-manager-15.04.2.tar.xz";
+ sha256 = "0hry52ypcchzbsvg5y4mw2h494l3cp4lqflhw48pilgzmz6pa1rk";
+ name = "print-manager-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "step-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/b51g9dz39d5raxgvl9fbmdbmsxjpniyg-step-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/step-15.04.2.tar.xz";
+ sha256 = "0skcnrdb3gcl8z2krmhi38dz5gr9a0bzvfgiv953bbr93hkjsscf";
+ name = "step-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "poxml-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/s9c62j11m3rc9w3i586hjwk1k29lhxwa-poxml-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/poxml-15.04.2.tar.xz";
+ sha256 = "09rvf4yzrncc0q3975mwj37a3pm0l07r3jnqzhbapdkkwjqs9ad3";
+ name = "poxml-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-filetransfer-handler-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/dwy5s9x602rr1m5cdjigk7mjvkab7h1c-ktp-filetransfer-handler-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-filetransfer-handler-15.04.2.tar.xz";
+ sha256 = "15y53z3kbbvk6vg1f3ns88mq6c9hmd41s2ayixhg109nwp7q0177";
+ name = "ktp-filetransfer-handler-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "zeroconf-ioslave-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/bxd782i7kh5ssxcsvd7b25rx9mwywlpj-zeroconf-ioslave-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/zeroconf-ioslave-15.04.2.tar.xz";
+ sha256 = "0129dc6r1sfxjg3bdfbnprgvf7iricshw1l879cw2lzb7wmqdpm9";
+ name = "zeroconf-ioslave-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kgeography-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/7fh80id5rynq5wigvx95r5jldyj09f8a-kgeography-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kgeography-15.04.2.tar.xz";
+ sha256 = "1iddjjpvyimbc9p0z2qzqc2v1q48pvm1d6qd4pdbycshpcm4wjwd";
+ name = "kgeography-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkcddb-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/wqlwval30d2jii0cpcnhyr7hvhn18yck-libkcddb-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkcddb-15.04.2.tar.xz";
+ sha256 = "1yrmvy8kldhh312dk4kipr15hr4zhsg2yj645naybfh2dya89q6m";
+ name = "libkcddb-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkmahjongg-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/i1rmk34a0bl0088ypi1vr3zgm22s0qxq-libkmahjongg-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkmahjongg-15.04.2.tar.xz";
+ sha256 = "1xrdv1p5gjzg4cs35y2kmd49lwiinl1wqaw76y5lq3p303k7vvm1";
+ name = "libkmahjongg-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ksquares-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/091km97cfa95lqa9ll2bmy1j4ayijc94-ksquares-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ksquares-15.04.2.tar.xz";
+ sha256 = "01h8kcahn72lh9hdqljz9fx9wdh3gx7rk7fk0xpc7fh0qqwcdv9i";
+ name = "ksquares-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ksudoku-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/6056jj6bns8mgr6ss3jqfdrwm1nlmvm2-ksudoku-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ksudoku-15.04.2.tar.xz";
+ sha256 = "1xn2d7aiqv0q3lg5iwhjp2abwq2ssxa8gdjawvj40xq4zffr0wna";
+ name = "ksudoku-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kollision-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/47lslszl9rlnpiw1ic2lxkrd5302kswb-kollision-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kollision-15.04.2.tar.xz";
+ sha256 = "0jqjg6dr2ff5qb5f23kfd017m1lm7h2rim6q8dkbxk4xm92f5kqi";
+ name = "kollision-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kcron-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ilz3z9pv0axrikakkrl1ibkv496r34ys-kcron-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kcron-15.04.2.tar.xz";
+ sha256 = "0fszrwgsib82glm0hi2iq11b8z3w8j14vp8hqfxp8ccggk1a0xaf";
+ name = "kcron-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "bovo-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/4lz289bp3agyw5igfvpdzi123m7qmiy4-bovo-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/bovo-15.04.2.tar.xz";
+ sha256 = "00w5d9mapy4f634ys1k45fhpa50h5299y9q6wann9phrmf8kj8y2";
+ name = "bovo-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "filelight-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/654c7xpn6kvbvglh0sxg5qz75w52nfsi-filelight-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/filelight-15.04.2.tar.xz";
+ sha256 = "0ynrirvrisswaia9894wd4b6f97h04bd3w9zlv28nc9ck1p2d5zv";
+ name = "filelight-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "picmi-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1xlxqdznc1w89hvz6ykzpbd4pkrxifmh-picmi-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/picmi-15.04.2.tar.xz";
+ sha256 = "06dz8552rfydirvmnibvpw0ahg4f2za82qkv2j2crfqm2iigp9rv";
+ name = "picmi-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kig-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/0g5k9zx2d4fxpsa4pifpilrm9xamq40g-kig-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kig-15.04.2.tar.xz";
+ sha256 = "19wv15ji7f0m0zzymw11g28sa5n1kyhpnqbcgpfkaqxynv2fn4cv";
+ name = "kig-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ksirk-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/81c1aijibwhrdhn149m3wx2zxv3l2r8f-ksirk-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ksirk-15.04.2.tar.xz";
+ sha256 = "0w6j3z8vzj3wnnwkpm2gv533jkjwdx8f2m6hnqa3ckzashmlqx7w";
+ name = "ksirk-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "okular-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/9i3ma5arv1bfij2f92lmrg4z1fz7jr2v-okular-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/okular-15.04.2.tar.xz";
+ sha256 = "0cqqh4f4ymyx7204ba0afy2hscayd8aqg8dpbv13xxhs8m1aa3p7";
+ name = "okular-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ksystemlog-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/635srb7rlzyzlii3qf1j9p85fn18cdw6-ksystemlog-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ksystemlog-15.04.2.tar.xz";
+ sha256 = "00il9r3n5756n0n6k515fdm9z7mfa1gd1n6kac4vr7yldvll9wh1";
+ name = "ksystemlog-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kmousetool-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/fchxy0dfggh8hgd1z8yp13qgn1xrhxvl-kmousetool-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kmousetool-15.04.2.tar.xz";
+ sha256 = "1nkn25zg6bb4pc7s93f6igcpspy1a1wlzh2ckmm2613594jh1qr9";
+ name = "kmousetool-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdegraphics-mobipocket-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ah5gjm6qdj22i62i1davbd88hwpp7bb0-kdegraphics-mobipocket-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdegraphics-mobipocket-15.04.2.tar.xz";
+ sha256 = "1y3w477bws206fx1rymvp9dr7z8bxy1l2p0cdawlnbir9bamsnnc";
+ name = "kdegraphics-mobipocket-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-kded-module-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/n874w08k1vfkinc01hr4hlvd4qg9ln8r-ktp-kded-module-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-kded-module-15.04.2.tar.xz";
+ sha256 = "1a7jfa8lqb24dpckiix13lhdgb18rv4v9ib908jqqqnk8rphac5n";
+ name = "ktp-kded-module-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "klines-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/6wl8yszqa313v9w1b8l05qc2ajdxn9vj-klines-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/klines-15.04.2.tar.xz";
+ sha256 = "11ksr0khyj29bbzcavpxm4kc109m2g2gbhi4qhsyanfj8a0811az";
+ name = "klines-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdenetwork-filesharing-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/hdkpbx4z3d9wx6zmhcdfsj8rmxsyh3ay-kdenetwork-filesharing-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdenetwork-filesharing-15.04.2.tar.xz";
+ sha256 = "0l7s9a8ngwvz11bk5d5q4vxi0xvqc2jk62zcqq0mjiznd3vwiqdy";
+ name = "kdenetwork-filesharing-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "klickety-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/4k68344zgzdb3a11zgjlv4npcc16gxag-klickety-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/klickety-15.04.2.tar.xz";
+ sha256 = "149jka949jcpd75kg9rk2xa6m3hvkaiif57a35bg2pdzs41dqnn5";
+ name = "klickety-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-contact-runner-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/79xzz7i1yspf2mlzzbzzgaxk8szx0a8p-ktp-contact-runner-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-contact-runner-15.04.2.tar.xz";
+ sha256 = "00r8z9zg9g1lpr6jmkr5l0n4w7zsskl35spral6ibbnnvfcv7jrf";
+ name = "ktp-contact-runner-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdenlive-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/5q0r2446rj0dkxc3k5m96rjbbcgvyg4a-kdenlive-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdenlive-15.04.2.tar.xz";
+ sha256 = "1q17b5gihcgi5svs123h0vl25ij4ajybk16is9hjyfpmhkl7nyfa";
+ name = "kdenlive-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "lskat-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/6gskfm2ymh6mnv2irgj5v21r3hhypf9s-lskat-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/lskat-15.04.2.tar.xz";
+ sha256 = "1ydmglbihijpsgq29nz3sg3g8sja9nzqd7czpg8z8zy9gylh6cl4";
+ name = "lskat-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kblackbox-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/16pvgzgzp6y44n3cmpnajgw74m92wd9i-kblackbox-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kblackbox-15.04.2.tar.xz";
+ sha256 = "1ib9a9pp9mdp2kbz2gb4lnrlf66v7170y4qrg24vmvpsa7csgmx3";
+ name = "kblackbox-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kapptemplate-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/33rnc300y683cxcp50mi1awdk4rxpp18-kapptemplate-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kapptemplate-15.04.2.tar.xz";
+ sha256 = "092wysas8zfhz8af4fvizbn148c4jhj4vk2cy6z94qih8hnry294";
+ name = "kapptemplate-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kbreakout-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/s3ni25fyw0i7jykk0bdybq4jq60yfgi5-kbreakout-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kbreakout-15.04.2.tar.xz";
+ sha256 = "1wrggwcgyc6vlxy0zx8y69lvz0njalbfw54sgnrnc8ka65mjr0pg";
+ name = "kbreakout-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktimer-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/wr8lj1871w99ffd0dgjyn3rgr2kix9sm-ktimer-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktimer-15.04.2.tar.xz";
+ sha256 = "19ah9r92i8r4059apvv1aj25hvkhq3dw9vmvi5r8sxrdbd3m0yw0";
+ name = "ktimer-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "juk-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/rcckq4x2wvg7rgm4nbwlmzqhxsasmbd4-juk-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/juk-15.04.2.tar.xz";
+ sha256 = "08lwi7yakry6cwrr0hxmrb9h2nm5xkx39bwfsphrd4vkyfd94awp";
+ name = "juk-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdewebdev-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1b0cd8ahc9841k5f3yp8mnfi43gmca5b-kdewebdev-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdewebdev-15.04.2.tar.xz";
+ sha256 = "0cq2zyi4j6z70ghy8x1hhi3bgph6ql2k71vllfc37gb5h8gqpfh4";
+ name = "kdewebdev-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "pairs-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/8n1ls70j6sp30v5172f8b4pni77h612w-pairs-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/pairs-15.04.2.tar.xz";
+ sha256 = "11hbzh8nk38m1n61vcyzz1v6q1fpwyiv9l6s05mrsm4krny2bi4a";
+ name = "pairs-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kopete-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qxv3q0s8qvkmw3gv186zb5h8ds9qif9c-kopete-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kopete-15.04.2.tar.xz";
+ sha256 = "1zvf0y7f8r97lvwcspp2bwph5wsh1rcac9hp6vg0hkama3iqfbk3";
+ name = "kopete-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kreversi-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1d78nc8bn6q9pya6fmbvpv1j504h2p74-kreversi-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kreversi-15.04.2.tar.xz";
+ sha256 = "0qzwk8yj5dk01n6w1jmrqncy48cpg2xriqqiachx4gh878f2y4cs";
+ name = "kreversi-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "knetwalk-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/40vin5w140gna791rbdvgiqv6gmdy5a6-knetwalk-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/knetwalk-15.04.2.tar.xz";
+ sha256 = "0j2zkh87wd2xhd0aaad40cjq1na4kg18y0bnpiqdgwgmvvss18cn";
+ name = "knetwalk-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdeartwork-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/nfikvnas8aa532z85hra7d5lbdcp0sjb-kdeartwork-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdeartwork-15.04.2.tar.xz";
+ sha256 = "0dhm6n5x8pq4nl8f5gnr2cdgy3fjkqyhij9gdxqan5s7rhfq7j4n";
+ name = "kdeartwork-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "artikulate-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ch4qds4ksc7bxc7qvnp594bcq15f7lfg-artikulate-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/artikulate-15.04.2.tar.xz";
+ sha256 = "1hi57rl5ibs28l5w3gwciv9yi9gw7q22say8w5b34b5kjw0cyg2v";
+ name = "artikulate-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kaccounts-providers-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/br9b5cwnam0xgh9pm3sa1gf6r4wmr2pf-kaccounts-providers-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kaccounts-providers-15.04.2.tar.xz";
+ sha256 = "1a2mwv1lvmnw7apb94w4620ip3d3p8xxp3ff0yg633x60g0wnkiv";
+ name = "kaccounts-providers-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kiten-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/kpd3k77yxizdi9x0063m6dwjlw002xmh-kiten-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kiten-15.04.2.tar.xz";
+ sha256 = "0yr7i1k3qpifwy2a58b899nfglkyf8gdrbakhdd9j2rlyyk3hya3";
+ name = "kiten-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libksane-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3058pvg2jwnd405awd0ajk78qbn3pgr2-libksane-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libksane-15.04.2.tar.xz";
+ sha256 = "0s2jmp1596qnjff2fqmlmg3qzfhf2wjfvazkrrndfr6dzn4sz72s";
+ name = "libksane-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdegraphics-strigi-analyzer-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/jw8kq5lv729dyz48fr0ynck8l1fi5lz9-kdegraphics-strigi-analyzer-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdegraphics-strigi-analyzer-15.04.2.tar.xz";
+ sha256 = "1gf6n1bdhbizfgpbn1p81gzz09a028dadij7gn016vkfczjkl1k8";
+ name = "kdegraphics-strigi-analyzer-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "cantor-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/kay8y3b2yqw6x5n6d0bjh86x76p1pvr3-cantor-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/cantor-15.04.2.tar.xz";
+ sha256 = "0y7gs13s38swvicfw9wlxgqr96bvny4d2rsvnkb0cn1d68vmb7jm";
+ name = "cantor-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "dragon-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/v0ig7hdlixwprlrjpirxsj3mqg3mzj34-dragon-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/dragon-15.04.2.tar.xz";
+ sha256 = "0kf692d3wsj32iry3dl148f4i04y9y26nc9v4skpwf5pvsgp2d5s";
+ name = "dragon-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-auth-handler-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/58nbpzqmcw17152bs24lh6h3mj6c6nlf-ktp-auth-handler-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-auth-handler-15.04.2.tar.xz";
+ sha256 = "1fp1yks0k2mfn9kqfsy5y27ibpfjvmlx4h1ah6sy5mmqvh96s04h";
+ name = "ktp-auth-handler-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "katomic-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/hxhzw8r4ji2z6m1scybs90q3n4sf0p34-katomic-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/katomic-15.04.2.tar.xz";
+ sha256 = "1gpg01ngqmfkiwzfcx686x2yzd4sjlp5xkdrgdwy20czl1i6rras";
+ name = "katomic-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "svgpart-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/9kjmy8gy1lybbgv45m3jpi5dg2f0d9xl-svgpart-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/svgpart-15.04.2.tar.xz";
+ sha256 = "09f9zfppa82zxzrm7b1c7q6hn3dry0rwzz3xpx26dsh219qaax29";
+ name = "svgpart-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdegraphics-thumbnailers-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/bg5g9qpbzwrp50ipg3x9mi54dmp04hnw-kdegraphics-thumbnailers-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdegraphics-thumbnailers-15.04.2.tar.xz";
+ sha256 = "15w0bli83ykqdxv37zpmdgf66gkqmb3gf1wxqfhw241pfcqbsxc3";
+ name = "kdegraphics-thumbnailers-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-accounts-kcm-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/2ws9qacikk9az2dj6lxmg1swm7kwvyk4-ktp-accounts-kcm-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-accounts-kcm-15.04.2.tar.xz";
+ sha256 = "1icmsax7abwfjavmq9vn2l3hj7hbjdhky60hga52sdnw7hy58n01";
+ name = "ktp-accounts-kcm-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktuberling-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qvbh4g988977fqahh0vdy6y2mcsa03sq-ktuberling-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktuberling-15.04.2.tar.xz";
+ sha256 = "1kf2gwxwh0v9lai5lwbgd9d8d27d9p6vxj6i4291w5wv9plld9my";
+ name = "ktuberling-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-baseapps-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/y8fy3h6ypqnzr883hq02c8p0rfilizs5-kde-baseapps-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-baseapps-15.04.2.tar.xz";
+ sha256 = "0yqg1z6c9ma8cfhpb21jgk5hcpg0dscm89sy5jxwflg1n355jkhv";
+ name = "kde-baseapps-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kcalc-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/q36zxbwxvwhmccqsqvjp7s0amc56ci9g-kcalc-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kcalc-15.04.2.tar.xz";
+ sha256 = "0sk431vrz8xc12fc6qfdlxcnkr5yl729pk450pj90xm6x0jj24lp";
+ name = "kcalc-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "sweeper-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ailfyyak31rbjd1syva34lh8ldqa589i-sweeper-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/sweeper-15.04.2.tar.xz";
+ sha256 = "0nyl587zrmz4aynbp7g7415gczilmb02h79s4xpfxilmxc9910w3";
+ name = "sweeper-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kuser-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/841sa28hlcjqbh223vfyhf90xk2v7fwk-kuser-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kuser-15.04.2.tar.xz";
+ sha256 = "0b2q616nzqjb0q9as71x2njdjlcd3576rkwnyv5acjgb5bq7wgg4";
+ name = "kuser-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kturtle-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/b7v36hd1nplcfjn9j4sphxh08mw366l8-kturtle-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kturtle-15.04.2.tar.xz";
+ sha256 = "0xgb2ahzyg88iz1dgvbc5n17fbds56mixcfk4mmi2hgycckjk910";
+ name = "kturtle-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkface-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/gpvb35d3ri6z7bxvczhhq4d04a59aa32-libkface-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkface-15.04.2.tar.xz";
+ sha256 = "08xc93jjplqc6y0m9q6krwplfjj2cklvbw8m9dhhv1w6mn8qp8r3";
+ name = "libkface-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "audiocd-kio-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/92qgv319y1sypkgcgzhr8k2m2ii992kb-audiocd-kio-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/audiocd-kio-15.04.2.tar.xz";
+ sha256 = "1vxqabysh3mjmrzaxz2kldx2a6w07rxf1adka1fwp2yhajb1bzlh";
+ name = "audiocd-kio-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kppp-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/jw9l8530fgdkkzyxdmf90g1p3s7phhs2-kppp-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kppp-15.04.2.tar.xz";
+ sha256 = "0g89b800v06p1ymxdm7g04ajdmdh86y740hnzr0r64rdhsxq0wn9";
+ name = "kppp-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kget-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/57ri311sxq7bq64by12vgjqsgmajrfk7-kget-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kget-15.04.2.tar.xz";
+ sha256 = "0cc7rva5yig01kfih1im0ncf0jk7hq1pwyqr9486n024161fc1n0";
+ name = "kget-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kolourpaint-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/1n2511qxgqb7prz2l85psdq1dypq3qms-kolourpaint-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kolourpaint-15.04.2.tar.xz";
+ sha256 = "04rly3wrh8hibaps90mphvbb35d9c308czfmnhqxyk6np4bfvrk6";
+ name = "kolourpaint-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktouch-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/fbf91j6jf0f3ws7sa8spsk2zkm08s5j4-ktouch-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktouch-15.04.2.tar.xz";
+ sha256 = "18f0r9d0hs1prrwj33iwik9ipdf3hyf316yz7jbg3iyygp8xa1wf";
+ name = "ktouch-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kbruch-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/zf38d9iax1bnwga069a921zc7156f6sy-kbruch-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kbruch-15.04.2.tar.xz";
+ sha256 = "0w1fw3lydp5znk3n5fhg30gj7mxi7v6y7hv46wl01cysd73m7825";
+ name = "kbruch-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kolf-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/mbfh9c9jrs8a8xb6srhny9ipjs52nx01-kolf-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kolf-15.04.2.tar.xz";
+ sha256 = "0fifvpsp6nbr58r1pammynw4zh4k9z51vgm5xbcl1k6pblh6hn6l";
+ name = "kolf-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kgamma-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/i6k8yvh7rf1dqd2kn6aqmyzzcayxp3sy-kgamma-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kgamma-15.04.2.tar.xz";
+ sha256 = "08ia2skz3w6zwzm9jlgiyrlxnn7mx83d78350plr5k6qrszn483l";
+ name = "kgamma-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kigo-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/9ca8cpnw78bnlrqi1yyy192qbb93y82q-kigo-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kigo-15.04.2.tar.xz";
+ sha256 = "00hhdhv905l1y79i2vsz65r7vqbz2vlzl57y4sdcjpk65ababcrc";
+ name = "kigo-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kdesdk-kioslaves-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/vdwv4ww6n28gpc2rkylml28yalihy1q6-kdesdk-kioslaves-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kdesdk-kioslaves-15.04.2.tar.xz";
+ sha256 = "0fpmn0cv95jicxq6zbxivarlyhmjbi3a2brnz9xb4jznx06c2cz8";
+ name = "kdesdk-kioslaves-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kde-dev-scripts-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qc0mhibyrkipf7ryl45d0caaj5xsvmpc-kde-dev-scripts-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kde-dev-scripts-15.04.2.tar.xz";
+ sha256 = "07lliwm96m2nvwa52vsch9x85vxxj7cqlvfm3ynv8nw49pmlkdi5";
+ name = "kde-dev-scripts-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kcachegrind-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/l7vgzgq9zh2q3nm6lvvxg57p86qr6z8a-kcachegrind-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kcachegrind-15.04.2.tar.xz";
+ sha256 = "1f3iqjd4dk3agk6kw096199yrd8ag3zjx9zz58gvlkdww9rlap13";
+ name = "kcachegrind-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkomparediff2-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ayx65a6hvxxyw4cclvw8f9c79pixbklf-libkomparediff2-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkomparediff2-15.04.2.tar.xz";
+ sha256 = "0qj9ih96v3r2l9nq68z4y175nhizl8rmd4nypswy5lzi7k8m9q99";
+ name = "libkomparediff2-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "killbots-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/v7qcb9dvh0sg031y8s7qlhjj7bfi0hba-killbots-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/killbots-15.04.2.tar.xz";
+ sha256 = "1xr7857fi5l5h6d6fsyqsb803h29gprfsxz4h73scnnn70bkkm9q";
+ name = "killbots-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "rocs-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/llzpz351096v1jq26pnpq38s353rijfk-rocs-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/rocs-15.04.2.tar.xz";
+ sha256 = "0zgxgbmmc3wy0k0s6dx7gprw4dl1rgdrq2ah98zr658bpwkkm9aw";
+ name = "rocs-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kmines-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/678x21vwippxpjg2bsv79127s6852clb-kmines-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kmines-15.04.2.tar.xz";
+ sha256 = "1n49vzbyiiya0inxp0kydh47mm5m2qgm8x3n6yj9hjhllvjm885s";
+ name = "kmines-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkdeedu-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/ykck6cw92ddmlcarb2b5rkqcsshrk54w-libkdeedu-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkdeedu-15.04.2.tar.xz";
+ sha256 = "1pvipdv3zhqpnmz4x68jdfml2hjamlb591r9qcibw1pzgx7bz77q";
+ name = "libkdeedu-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "ktp-common-internals-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/aifqj9bdnahhjisqbiamcx8mq8fkw234-ktp-common-internals-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/ktp-common-internals-15.04.2.tar.xz";
+ sha256 = "0b255d8yf8xi426kpsqb3s1dqsqvypk485pw327kvqg2jj2jdmiq";
+ name = "ktp-common-internals-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kompare-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3z0xfsx62crxyp35in81zz5y84dcrfgr-kompare-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kompare-15.04.2.tar.xz";
+ sha256 = "0c3kyfqz6mp4mj0ryhjgqwp2x93bj0nsbgp2vf9rgvkcdvhd6fqk";
+ name = "kompare-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "analitza-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/qfq2a23wsl1lws544pp5p0hgmprr2kaj-analitza-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/analitza-15.04.2.tar.xz";
+ sha256 = "117mw7c74vxh6mp76lxw1jc231b2zvif8d721dl5nshggkxhmf9j";
+ name = "analitza-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "parley-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/fcj9c30mhz0s2qhlch2sc1bsy52vp1hk-parley-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/parley-15.04.2.tar.xz";
+ sha256 = "1xzjpm8vfxp7g5497n95r3x4pbs6s29jaf6rlkb3lm72x7yml7fc";
+ name = "parley-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "libkipi-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/3c6adpvdmw4yvwqa4ivn3mqf0himjf1f-libkipi-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/libkipi-15.04.2.tar.xz";
+ sha256 = "1fn671kjmin20bgi6h34fvcn3811ms34i9xbpxc3vv2s4sgn2v72";
+ name = "libkipi-15.04.2.tar.xz";
+ };
+ }
+ {
+ name = stdenv.lib.nameFromURL "kqtquickcharts-15.04.2.tar.xz" ".tar";
+ store = "/nix/store/q3m5pc6n5f7l2hipmfplsjbswzg8n0vh-kqtquickcharts-15.04.2.tar.xz";
+ src = fetchurl {
+ url = "${mirror}/stable/applications/15.04.2/src/kqtquickcharts-15.04.2.tar.xz";
+ sha256 = "02fclmqa845cd6gll89m2fi382syani9r84w0hnnsyc77dqrlqi6";
+ name = "kqtquickcharts-15.04.2.tar.xz";
+ };
+ }
]
diff --git a/pkgs/applications/kde-apps-15.04/manifest.sh b/pkgs/applications/kde-apps-15.04/manifest.sh
index 2aa3cee8c85..d74d9cbbfbc 100755
--- a/pkgs/applications/kde-apps-15.04/manifest.sh
+++ b/pkgs/applications/kde-apps-15.04/manifest.sh
@@ -10,6 +10,7 @@ if [ $# -eq 0 ]; then
$(nix-build ../../.. -A autonix.manifest) \
"${KDE_MIRROR}/stable/applications/15.04.0/" \
"${KDE_MIRROR}/stable/applications/15.04.1/" \
+ "${KDE_MIRROR}/stable/applications/15.04.2/" \
$MANIFEST_EXTRA_ARGS -A '*.tar.xz'
else
diff --git a/pkgs/applications/misc/apvlv/default.nix b/pkgs/applications/misc/apvlv/default.nix
new file mode 100644
index 00000000000..aa312f4c8a9
--- /dev/null
+++ b/pkgs/applications/misc/apvlv/default.nix
@@ -0,0 +1,48 @@
+{ stdenv, fetchurl, cmake, pkgconfig,
+ gtk2 , poppler, freetype, libpthreadstubs, libXdmcp, libxshmfence
+}:
+
+stdenv.mkDerivation rec {
+ version = "0.1.f7f7b9c";
+ name = "apvlv-${version}";
+
+ src = fetchurl {
+ url = "https://github.com/downloads/naihe2010/apvlv/${name}-Source.tar.gz";
+ sha256 = "125nlcfjdhgzi9jjxh9l2yc9g39l6jahf8qh2555q20xkxf4rl0w";
+ };
+
+ preConfigure = ''
+ export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -I${poppler}/include/poppler"
+ '';
+
+ buildInputs = [
+ pkgconfig cmake
+ poppler
+ freetype gtk2
+ libpthreadstubs libXdmcp libxshmfence # otherwise warnings in compilation
+ ];
+
+ installPhase = ''
+ # binary
+ mkdir -p $out/bin
+ cp src/apvlv $out/bin/apvlv
+
+ # displays pdfStartup.pdf as default pdf entry
+ mkdir -p $out/share/doc/apvlv/
+ cp ../Startup.pdf $out/share/doc/apvlv/Startup.pdf
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "http://naihe2010.github.io/apvlv/";
+ description = "PDF viewer with Vim-like behaviour";
+ longDescription = ''
+ apvlv is a PDF/DJVU/UMD/TXT Viewer Under Linux/WIN32
+ with Vim-like behaviour.
+ '';
+
+ license = licenses.lgpl2;
+ platforms = platforms.unix;
+ maintainers = [ maintainers.ardumont ];
+ };
+
+}
diff --git a/pkgs/applications/misc/calibre/default.nix b/pkgs/applications/misc/calibre/default.nix
index 0e821e92703..b5dbfe207fe 100644
--- a/pkgs/applications/misc/calibre/default.nix
+++ b/pkgs/applications/misc/calibre/default.nix
@@ -5,11 +5,11 @@
}:
stdenv.mkDerivation rec {
- name = "calibre-2.29.0";
+ name = "calibre-2.30.0";
src = fetchurl {
url = "mirror://sourceforge/calibre/${name}.tar.xz";
- sha256 = "1n3cfnjnghhhsgzcbcvbr0gh191lhl6az09q1s68jhlcc2lski6l";
+ sha256 = "1k2rpn06nfzqjy5k6fh8pwfj8vbhpn7rgkpkkpz5n2fqg3z8ph1j";
};
inherit python;
diff --git a/pkgs/applications/misc/cherrytree/default.nix b/pkgs/applications/misc/cherrytree/default.nix
index fa5ae99f4fb..eb73f48559a 100644
--- a/pkgs/applications/misc/cherrytree/default.nix
+++ b/pkgs/applications/misc/cherrytree/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, python, pythonPackages, gettext, pygtksourceview, sqlite }:
stdenv.mkDerivation rec {
- name = "cherrytree-0.35.7";
+ name = "cherrytree-0.35.8";
src = fetchurl {
url = "http://www.giuspen.com/software/${name}.tar.xz";
- sha256 = "03p3bx7skc361rmh0axhm0fa0inmxv4bpa9l566wskb3zq4sy4g3";
+ sha256 = "0vqc1idzd73f4q5f4zwwypj4jiivwnb4y0r3041h2pm08y1wgsd8";
};
propagatedBuildInputs = [ pythonPackages.sqlite3 ];
diff --git a/pkgs/applications/misc/cortex/default.nix b/pkgs/applications/misc/cortex/default.nix
index 79d19f45a25..2aad3b20e22 100644
--- a/pkgs/applications/misc/cortex/default.nix
+++ b/pkgs/applications/misc/cortex/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchgit, python3 }:
stdenv.mkDerivation {
- name = "cortex";
+ name = "cortex-2014-08-01";
src = fetchgit {
url = "https://github.com/gglucas/cortex";
diff --git a/pkgs/applications/misc/dfilemanager/default.nix b/pkgs/applications/misc/dfilemanager/default.nix
new file mode 100644
index 00000000000..40bb2e8fe56
--- /dev/null
+++ b/pkgs/applications/misc/dfilemanager/default.nix
@@ -0,0 +1,25 @@
+{ stdenv, fetchgit, cmake, qt5, file, kde5}:
+
+let
+ version = "git-2015-06-10";
+in
+stdenv.mkDerivation rec {
+ name = "dfilemanager-${version}";
+ src = fetchgit {
+ url = "git://git.code.sf.net/p/dfilemanager/code";
+ rev = "806a28aa8fed30941a2fd6784c7c9c240bca30e3";
+ sha256 = "1k15qzjmqg9ffv4cl809b071dpyckf8jspkhfhpbmfd9wasr0m7i";
+ };
+
+ buildInputs = [ cmake qt5.base qt5.tools qt5.x11extras file kde5.solid];
+
+ cmakeFlags = "-DQT5BUILD=true";
+
+ meta = {
+ homepage = "http://dfilemanager.sourceforge.net/";
+ description = "File manager written in Qt/C++, it does use one library from kdelibs, the solid lib for easy device handling";
+ #license = stdenv.lib.licenses; # license not specified
+ platforms = stdenv.lib.platforms.unix;
+ maintainers = [ stdenv.lib.maintainers.eduarrrd ];
+ };
+}
diff --git a/pkgs/applications/misc/keepass/default.nix b/pkgs/applications/misc/keepass/default.nix
index d46efc4e5e8..f659e4f6c2d 100644
--- a/pkgs/applications/misc/keepass/default.nix
+++ b/pkgs/applications/misc/keepass/default.nix
@@ -1,17 +1,21 @@
-{ stdenv, fetchurl, unzip, makeDesktopItem, mono }:
+{ stdenv, fetchurl, buildDotnetPackage, makeWrapper, unzip, makeDesktopItem }:
-stdenv.mkDerivation rec {
- name = "keepass-${version}";
+buildDotnetPackage rec {
+ baseName = "keepass";
version = "2.29";
src = fetchurl {
- url = "mirror://sourceforge/keepass/KeePass-${version}.zip";
- sha256 = "16x7m899akpi036c0wlr41w7fz9q0b69yac9q97rqkixb03l4g9d";
+ url = "mirror://sourceforge/keepass/KeePass-${version}-Source.zip";
+ sha256 = "051s0aznyyhbpdbly6h5rs0ax0zvkp45dh93nmq6lwhicswjwn5m";
};
sourceRoot = ".";
- phases = [ "unpackPhase" "installPhase" ];
+ buildInputs = [ unzip ];
+
+ patches = [ ./keepass.patch ];
+
+ preConfigure = "rm -rvf Build/*";
desktopItem = makeDesktopItem {
name = "keepass";
@@ -22,23 +26,19 @@ stdenv.mkDerivation rec {
categories = "Application;Other;";
};
+ outputFiles = [ "Build/KeePass/Release/*" "Build/KeePassLib/Release/*" ];
+ dllFiles = [ "KeePassLib.dll" ];
+ exeFiles = [ "KeePass.exe" ];
- installPhase = ''
- mkdir -p "$out/bin"
- echo "${mono}/bin/mono $out/KeePass.exe" > $out/bin/keepass
- chmod +x $out/bin/keepass
- echo $out
- cp -r ./* $out/
+ postInstall = ''
mkdir -p "$out/share/applications"
cp ${desktopItem}/share/applications/* $out/share/applications
'';
- buildInputs = [ unzip ];
-
meta = {
description = "GUI password manager with strong cryptography";
homepage = http://www.keepass.info/;
- maintainers = with stdenv.lib.maintainers; [amorsillo];
+ maintainers = with stdenv.lib.maintainers; [ amorsillo obadz ];
platforms = with stdenv.lib.platforms; all;
license = stdenv.lib.licenses.gpl2;
};
diff --git a/pkgs/applications/misc/keepass/keepass.patch b/pkgs/applications/misc/keepass/keepass.patch
new file mode 100644
index 00000000000..6ecf0bb074d
--- /dev/null
+++ b/pkgs/applications/misc/keepass/keepass.patch
@@ -0,0 +1,89 @@
+diff -Naur old/KeePass/KeePass.csproj new/KeePass/KeePass.csproj
+--- old/KeePass/KeePass.csproj 2015-04-10 11:00:46.000000000 +0100
++++ new/KeePass/KeePass.csproj 2015-05-27 16:35:52.196177593 +0100
+@@ -1,4 +1,4 @@
+-
++
+
+ Debug
+ AnyCPU
+@@ -10,7 +10,7 @@
+ KeePass
+ KeePass
+ KeePass.ico
+- true
++ false
+ KeePass.pfx
+
+
+@@ -1316,6 +1316,5 @@
+
+ -->
+
+- "$(FrameworkSDKDir)bin\sgen.exe" /assembly:"$(TargetPath)" /force /nologo /compiler:/keycontainer:VS_KEY_33430356D8D7D1B8 /compiler:/delaysign-
+
+-
+\ No newline at end of file
++
+diff -Naur old/KeePassLib/KeePassLib.csproj new/KeePassLib/KeePassLib.csproj
+--- old/KeePassLib/KeePassLib.csproj 2014-05-08 15:00:24.000000000 +0100
++++ new/KeePassLib/KeePassLib.csproj 2015-05-27 16:35:52.197177562 +0100
+@@ -1,4 +1,4 @@
+-
++
+
+ Debug
+ AnyCPU
+@@ -9,7 +9,7 @@
+ Properties
+ KeePassLib
+ KeePassLib
+- true
++ false
+ KeePassLib.pfx
+
+
+diff -Naur old/KeePass.sln new/KeePass.sln
+--- old/KeePass.sln 2009-08-31 19:47:28.000000000 +0100
++++ new/KeePass.sln 2015-05-27 16:35:59.568953518 +0100
+@@ -1,11 +1,9 @@
+-Microsoft Visual Studio Solution File, Format Version 10.00
++Microsoft Visual Studio Solution File, Format Version 12.00
+ # Visual Studio 2008
+ Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "KeePassLib", "KeePassLib\KeePassLib.csproj", "{53573E4E-33CB-4FDB-8698-C95F5E40E7F3}"
+ EndProject
+ Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "KeePass", "KeePass\KeePass.csproj", "{10938016-DEE2-4A25-9A5A-8FD3444379CA}"
+ EndProject
+-Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "KeePassLibSD", "KeePassLibSD\KeePassLibSD.csproj", "{DC15F71A-2117-4DEF-8C10-AA355B5E5979}"
+-EndProject
+ Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "TrlUtil", "Translation\TrlUtil\TrlUtil.csproj", "{B7E890E7-BF50-4450-9A52-C105BD98651C}"
+ EndProject
+ Global
+@@ -44,18 +42,6 @@
+ {10938016-DEE2-4A25-9A5A-8FD3444379CA}.Release|Mixed Platforms.Build.0 = Release|Any CPU
+ {10938016-DEE2-4A25-9A5A-8FD3444379CA}.Release|Win32.ActiveCfg = Release|Any CPU
+ {10938016-DEE2-4A25-9A5A-8FD3444379CA}.Release|x64.ActiveCfg = Release|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Debug|Any CPU.Build.0 = Debug|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Debug|Mixed Platforms.ActiveCfg = Debug|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Debug|Mixed Platforms.Build.0 = Debug|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Debug|Win32.ActiveCfg = Debug|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Debug|x64.ActiveCfg = Debug|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Release|Any CPU.ActiveCfg = Release|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Release|Any CPU.Build.0 = Release|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Release|Mixed Platforms.ActiveCfg = Release|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Release|Mixed Platforms.Build.0 = Release|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Release|Win32.ActiveCfg = Release|Any CPU
+- {DC15F71A-2117-4DEF-8C10-AA355B5E5979}.Release|x64.ActiveCfg = Release|Any CPU
+ {B7E890E7-BF50-4450-9A52-C105BD98651C}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {B7E890E7-BF50-4450-9A52-C105BD98651C}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {B7E890E7-BF50-4450-9A52-C105BD98651C}.Debug|Mixed Platforms.ActiveCfg = Debug|Any CPU
+diff -Naur old/Translation/TrlUtil/TrlUtil.csproj new/Translation/TrlUtil/TrlUtil.csproj
+--- old/Translation/TrlUtil/TrlUtil.csproj 2013-07-21 10:06:38.000000000 +0100
++++ new/Translation/TrlUtil/TrlUtil.csproj 2015-05-27 16:35:52.197177562 +0100
+@@ -1,4 +1,4 @@
+-
++
+
+ Debug
+ AnyCPU
diff --git a/pkgs/applications/misc/llpp/default.nix b/pkgs/applications/misc/llpp/default.nix
index bbae8aca2b8..601ffe25200 100644
--- a/pkgs/applications/misc/llpp/default.nix
+++ b/pkgs/applications/misc/llpp/default.nix
@@ -4,12 +4,12 @@
let ocamlVersion = (builtins.parseDrvName (ocaml.name)).version;
in stdenv.mkDerivation rec {
name = "llpp-${version}";
- version = "21-git-2015-04-27";
+ version = "21-git-2015-06-06";
src = fetchgit {
url = "git://repo.or.cz/llpp.git";
- rev = "66868744188151eaa433d42c807e1efc5f623aa4";
- sha256 = "04hjbkzxixw88xmrpbr1smq486wfw3q9hvy7b4bfcb9j32mazk5c";
+ rev = "492d761c0c7c8c4ccdd4f0d3fa7c51434ce8acf2";
+ sha256 = "14dp5sw7cd6bja9d3zpxmswbk0k0b7x2fzb1fflhnnnhjc39irk9";
};
buildInputs = [ pkgconfig ninja makeWrapper ocaml findlib mupdf lablgl
diff --git a/pkgs/applications/misc/qpdfview/default.nix b/pkgs/applications/misc/qpdfview/default.nix
index 1cf6d76b892..574b73f5672 100644
--- a/pkgs/applications/misc/qpdfview/default.nix
+++ b/pkgs/applications/misc/qpdfview/default.nix
@@ -5,10 +5,10 @@ let
s = # Generated upstream information
rec {
baseName="qpdfview";
- version = "0.4.14";
+ version = "0.4.15";
name="${baseName}-${version}";
url="https://launchpad.net/qpdfview/trunk/${version}/+download/qpdfview-${version}.tar.gz";
- sha256 = "15d88xzqvrcp9szmz8d1lj65yrdx90j6fp78gia5c8kra2z8bik9";
+ sha256 = "0wgj02zpbyq4m2ix8rljiz312l2xk81gpy030vy424icq4xsip52";
};
buildInputs = [
qt4 poppler_qt4 pkgconfig djvulibre libspectre cups file ghostscript
diff --git a/pkgs/applications/misc/rofi/pass.nix b/pkgs/applications/misc/rofi/pass.nix
index c6b5666921c..8a7382ae737 100644
--- a/pkgs/applications/misc/rofi/pass.nix
+++ b/pkgs/applications/misc/rofi/pass.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
name = "rofi-${version}";
- version = "2015-05-29";
+ version = "2015-06-08";
src = fetchgit {
url = "https://github.com/carnager/rofi-pass";
- rev = "92c26557ec4b0508c563d596291571bbef402899";
- sha256 = "17k9jmmckqaw75i0qsay2gc8mrjrs6jjfwfxaggspj912sflmjng";
+ rev = "7e376b5ec64974c4e8478acf3ada8d111896f391";
+ sha256 = "1ywsxdgy5m63a2f5vd7np2f1qffz7y95z7s1gq5d87s8xd8myadl";
};
buildInputs = [ rofi wmctrl xprop xdotool ];
diff --git a/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-perls/default.nix b/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-perls/default.nix
index 3c5caeda789..6a1acca48d9 100644
--- a/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-perls/default.nix
+++ b/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-perls/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchgit }:
stdenv.mkDerivation {
- name = "urxvt-perls";
+ name = "urxvt-perls-2015-03-28";
src = fetchgit {
url = "git://github.com/muennich/urxvt-perls";
diff --git a/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-tabbedex/default.nix b/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-tabbedex/default.nix
index ba68a46cf0c..e924c3127ab 100644
--- a/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-tabbedex/default.nix
+++ b/pkgs/applications/misc/rxvt_unicode-plugins/urxvt-tabbedex/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchgit }:
stdenv.mkDerivation {
- name = "urxvt-tabbedex";
+ name = "urxvt-tabbedex-2015-03-03";
src = fetchgit {
url = "https://github.com/mina86/urxvt-tabbedex";
diff --git a/pkgs/applications/misc/slic3r/default.nix b/pkgs/applications/misc/slic3r/default.nix
index 36669dd8ae8..bfbc66cc0b9 100644
--- a/pkgs/applications/misc/slic3r/default.nix
+++ b/pkgs/applications/misc/slic3r/default.nix
@@ -3,13 +3,13 @@
}:
stdenv.mkDerivation rec {
- version = "1.2.6";
+ version = "1.2.7";
name = "slic3r-${version}";
src = fetchgit {
url = "git://github.com/alexrj/Slic3r";
rev = "refs/tags/${version}";
- sha256 = "1ymk2n9dw1mpizwg6bxbzq60mg1cwljxlncaasdyakqrkkr22r8k";
+ sha256 = "1bybbl8b0lfh9wkn1k9cxd11hlc5064wzh0fk6zdmc9vnnay399i";
};
buildInputs = with perlPackages; [ perl makeWrapper which
diff --git a/pkgs/applications/networking/browsers/chromium/common.nix b/pkgs/applications/networking/browsers/chromium/common.nix
index 1f6c272aceb..d3a0c86daf4 100644
--- a/pkgs/applications/networking/browsers/chromium/common.nix
+++ b/pkgs/applications/networking/browsers/chromium/common.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, ninja, which
# default dependencies
-, bzip2, flac, speex, icu, libopus
+, bzip2, flac, speex, libopus
, libevent, expat, libjpeg, snappy
, libpng, libxml2, libxslt, libcap
, xdg_utils, yasm, minizip, libwebp
@@ -84,7 +84,7 @@ let
};
defaultDependencies = [
- bzip2 flac speex icu opusWithCustomModes
+ bzip2 flac speex opusWithCustomModes
libevent expat libjpeg snappy
libpng libxml2 libxslt libcap
xdg_utils yasm minizip libwebp
@@ -113,7 +113,7 @@ let
glib gtk dbus_glib
libXScrnSaver libXcursor libXtst mesa
pciutils protobuf speechd libXdamage
- pythonPackages.gyp_svn1977 pythonPackages.ply pythonPackages.jinja2
+ pythonPackages.gyp pythonPackages.ply pythonPackages.jinja2
] ++ optional gnomeKeyringSupport libgnome_keyring3
++ optionals gnomeSupport [ gnome.GConf libgcrypt ]
++ optional enableSELinux libselinux
@@ -124,15 +124,10 @@ let
# be fixed, then try again to unbundle everything into separate
# derivations.
prePatch = ''
- cp -dsr --no-preserve=mode "${source.main}"/* .
- cp -dsr --no-preserve=mode "${source.sandbox}" sandbox
+ cp -dr --no-preserve=mode "${source.main}"/* .
+ cp -dr --no-preserve=mode "${source.sandbox}" sandbox
cp -dr "${source.bundled}" third_party
chmod -R u+w third_party
-
- # Hardcode source tree root in all gyp files
- find -iname '*.gyp*' \( -type f -o -type l \) \
- -exec sed -i -e 's|<(DEPTH)|'"$(pwd)"'|g' {} + \
- -exec chmod u+w {} +
'';
postPatch = optionalString (versionOlder version "42.0.0.0") ''
@@ -200,7 +195,7 @@ let
# This is to ensure expansion of $out.
libExecPath="${libExecPath}"
python build/linux/unbundle/replace_gyp_files.py ${gypFlags}
- python build/gyp_chromium -f ninja --depth "$(pwd)" ${gypFlags}
+ python build/gyp_chromium -f ninja --depth . ${gypFlags}
'';
buildPhase = let
diff --git a/pkgs/applications/networking/browsers/chromium/source/default.nix b/pkgs/applications/networking/browsers/chromium/source/default.nix
index 54430bb5be9..a3a46631484 100644
--- a/pkgs/applications/networking/browsers/chromium/source/default.nix
+++ b/pkgs/applications/networking/browsers/chromium/source/default.nix
@@ -18,7 +18,7 @@ let
"s,^/,,"
]);
- pre42 = versionOlder version "42.0.0.0";
+ pre44 = versionOlder version "44.0.0.0";
in stdenv.mkDerivation {
name = "chromium-source-${version}";
@@ -47,10 +47,10 @@ in stdenv.mkDerivation {
done
'';
- patches = if pre42 then [
- ./sandbox_userns_36.patch ./nix_plugin_paths.patch
- ] else [
+ patches = if pre44 then [
./nix_plugin_paths_42.patch
+ ] else [
+ ./nix_plugin_paths_44.patch
];
patchPhase = let
@@ -73,11 +73,10 @@ in stdenv.mkDerivation {
-e 's|/bin/echo|echo|' \
-e "/python_arch/s/: *'[^']*'/: '""'/" \
"$out/build/common.gypi" "$main/chrome/chrome_tests.gypi"
- '' + optionalString useOpenSSL ''
- cat $opensslPatches | patch -p1 -d "$bundled/openssl/openssl"
- '' + optionalString (!pre42) ''
sed -i -e '/LOG.*no_suid_error/d' \
"$main/content/browser/browser_main_loop.cc"
+ '' + optionalString useOpenSSL ''
+ cat $opensslPatches | patch -p1 -d "$bundled/openssl/openssl"
'';
preferLocalBuild = true;
diff --git a/pkgs/applications/networking/browsers/chromium/source/nix_plugin_paths.patch b/pkgs/applications/networking/browsers/chromium/source/nix_plugin_paths_44.patch
similarity index 84%
rename from pkgs/applications/networking/browsers/chromium/source/nix_plugin_paths.patch
rename to pkgs/applications/networking/browsers/chromium/source/nix_plugin_paths_44.patch
index 0220d042941..326da7f420a 100644
--- a/pkgs/applications/networking/browsers/chromium/source/nix_plugin_paths.patch
+++ b/pkgs/applications/networking/browsers/chromium/source/nix_plugin_paths_44.patch
@@ -55,21 +55,6 @@ index 8a205a6..d5c24e1 100644
return false;
cur = cur.Append(kInternalFlashPluginFileName);
break;
-@@ -295,12 +288,12 @@ bool PathProvider(int key, base::FilePath* result) {
- cur = cur.Append(chrome::kPepperFlashPluginFilename);
- break;
- case chrome::FILE_PDF_PLUGIN:
-- if (!GetInternalPluginsDirectory(&cur))
-+ if (!GetInternalPluginsDirectory(&cur, "PDF"))
- return false;
- cur = cur.Append(kInternalPDFPluginFileName);
- break;
- case chrome::FILE_EFFECTS_PLUGIN:
-- if (!GetInternalPluginsDirectory(&cur))
-+ if (!GetInternalPluginsDirectory(&cur, "FILE_EFFECTS"))
- return false;
- cur = cur.Append(kEffectsPluginFileName);
- break;
@@ -308,7 +301,7 @@ bool PathProvider(int key, base::FilePath* result) {
// We currently need a path here to look up whether the plugin is disabled
// and what its permissions are.
diff --git a/pkgs/applications/networking/browsers/chromium/source/sources.nix b/pkgs/applications/networking/browsers/chromium/source/sources.nix
index e1144a44afb..3adbbab8392 100644
--- a/pkgs/applications/networking/browsers/chromium/source/sources.nix
+++ b/pkgs/applications/networking/browsers/chromium/source/sources.nix
@@ -1,21 +1,21 @@
# This file is autogenerated from update.sh in the parent directory.
{
dev = {
- version = "43.0.2327.5";
- sha256 = "0k9jpzm1n7d3zv6f77vz33jcvmnbxnl6plabvlrf8w83kbzhi76n";
- sha256bin32 = "1dm4xp0x02kqj82giw45qd2z12wf22h2bs0d3hnlz050innxgcb6";
- sha256bin64 = "1b13g44y704llsnw68840zmaahj1hwzram50v8fqmff44w1b0bxb";
+ version = "45.0.2421.0";
+ sha256 = "1qc80y0mhwnvxrvpc3csskgb536wq34c0fgk19h1qb4xc62lxhsk";
+ sha256bin32 = "1xqhyrlmh00md6i1q4wr0xihqbvcpshzscnjclrn53dlw5zs2s89";
+ sha256bin64 = "0akdhwwdfcbqfh65a82zigbhsi8sbhhw6904cjprb3bmv4l3c598";
};
beta = {
- version = "42.0.2311.39";
- sha256 = "0qiyg8bg9f1daf8v2jlrv54lis7156h44ak42jdx96xanvj2rvj0";
- sha256bin32 = "0v4dr2a3n51dais2mg0dml0rmqfmalfj0zgp20a4kkarbpih1x0v";
- sha256bin64 = "19638ik9qgfmxpzdry0qwkwpzvhlbs2h2nn1kwsjja5j49817ksx";
+ version = "44.0.2403.39";
+ sha256 = "15c4adg0r9ym3pxya7vv4d148gv2pdwaaymxvvw511fjwffdv71n";
+ sha256bin32 = "1gaypkah10y31gb5f7vnyv0v73z5zjznmsp6vh2m4hfajx7s55jn";
+ sha256bin64 = "1j1ma6asl3ibjv3apyw24vhyi1qy64f586w8jizqzp4h962gj95c";
};
stable = {
- version = "41.0.2272.89";
- sha256 = "1saxcyqp8pz496qwdgl4dqxll6l9icbljm56w1rrkxgwrrvl4iwk";
- sha256bin32 = "19srg0isp1k4fwixwjxm1j88bnqx9sb349n992i038c3h8raa1v4";
- sha256bin64 = "1fb8ffgbsjsij7bd1qawa03z9pybasfig1cmdzwybmlwg2fdlvfv";
+ version = "43.0.2357.124";
+ sha256 = "09m8bb5f17mx6cd3h5irslw07h2s0drda35v17vcr7qfhk8jdh92";
+ sha256bin32 = "15n2fla1ixrqzi0in0vyl8n5wkv20fpd96lff65rwr9diylz287p";
+ sha256bin64 = "0x6igpcf29zmwqgphvy9nm527k9g7na2cvgc5nimw4fs5dakzzjr";
};
}
diff --git a/pkgs/applications/networking/browsers/chromium/source/update.nix b/pkgs/applications/networking/browsers/chromium/source/update.nix
index 27af85de546..e639cdb087b 100644
--- a/pkgs/applications/networking/browsers/chromium/source/update.nix
+++ b/pkgs/applications/networking/browsers/chromium/source/update.nix
@@ -9,7 +9,7 @@ let
then import ./sources.nix
else null;
- bucketURL = "http://commondatastorage.googleapis.com/"
+ bucketURL = "https://commondatastorage.googleapis.com/"
+ "chromium-browser-official";
debURL = "https://dl.google.com/linux/chrome/deb/pool/main/g";
diff --git a/pkgs/applications/networking/browsers/firefox-bin/default.nix b/pkgs/applications/networking/browsers/firefox-bin/default.nix
index 998ea95e8da..62afcc2583a 100644
--- a/pkgs/applications/networking/browsers/firefox-bin/default.nix
+++ b/pkgs/applications/networking/browsers/firefox-bin/default.nix
@@ -131,7 +131,13 @@ stdenv.mkDerivation {
for executable in \
firefox firefox-bin plugin-container \
- updater crashreporter webapprt-stub libxul.so
+ updater crashreporter webapprt-stub \
+ components/libdbusservice.so components/libmozgnome.so \
+ gmp-clearkey/0.1/libclearkey.so \
+ browser/components/libbrowsercomps.so \
+ libnssdbm3.so libsmime3.so libxul.so libnss3.so libplc4.so \
+ libfreebl3.so libmozsqlite3.so libmozalloc.so libnspr4.so libssl3.so \
+ libsoftokn3.so libnssutil3.so libnssckbi.so libplds4.so
do
patchelf --set-rpath "$libPath" \
"$out/usr/lib/firefox-bin-${version}/$executable"
@@ -143,7 +149,7 @@ stdenv.mkDerivation {
[Desktop Entry]
Type=Application
Exec=$out/bin/firefox
- Icon=$out/lib/firefox-bin-${version}/chrome/icons/default/default256.png
+ Icon=$out/usr/lib/firefox-bin-${version}/browser/icons/mozicon128.png
Name=Firefox
GenericName=Web Browser
Categories=Application;Network;
diff --git a/pkgs/applications/networking/browsers/firefox/default.nix b/pkgs/applications/networking/browsers/firefox/default.nix
index 03b96acc712..727f89fe668 100644
--- a/pkgs/applications/networking/browsers/firefox/default.nix
+++ b/pkgs/applications/networking/browsers/firefox/default.nix
@@ -1,9 +1,10 @@
-{ lib, stdenv, fetchurl, pkgconfig, gtk, pango, perl, python, zip, libIDL
+{ lib, stdenv, fetchurl, pkgconfig, gtk, gtk3, pango, perl, python, zip, libIDL
, libjpeg, zlib, dbus, dbus_glib, bzip2, xlibs
, freetype, fontconfig, file, alsaLib, nspr, nss, libnotify
, yasm, mesa, sqlite, unzip, makeWrapper, pysqlite
, hunspell, libevent, libstartup_notification, libvpx
, cairo, gstreamer, gst_plugins_base, icu
+, enableGTK3 ? false
, debugBuild ? false
, # If you want the resulting program to call itself "Firefox" instead
# of "Shiretoko" or whatever, enable this option. However, those
@@ -34,7 +35,8 @@ stdenv.mkDerivation rec {
xlibs.libXext xlibs.xextproto sqlite unzip makeWrapper
hunspell libevent libstartup_notification libvpx cairo
gstreamer gst_plugins_base icu
- ];
+ ]
+ ++ lib.optional enableGTK3 gtk3;
configureFlags =
[ "--enable-application=browser"
@@ -64,6 +66,7 @@ stdenv.mkDerivation rec {
"--disable-updater"
"--disable-pulseaudio"
]
+ ++ lib.optional enableGTK3 "--enable-default-toolkit=cairo-gtk3"
++ (if debugBuild then [ "--enable-debug" "--enable-profiling"]
else [ "--disable-debug" "--enable-release"
"--enable-optimize${lib.optionalString (stdenv.system == "i686-linux") "=-O1"}"
diff --git a/pkgs/applications/networking/browsers/mozilla-plugins/flashplayer-11/default.nix b/pkgs/applications/networking/browsers/mozilla-plugins/flashplayer-11/default.nix
index 35541b39ee8..79d95571f2f 100644
--- a/pkgs/applications/networking/browsers/mozilla-plugins/flashplayer-11/default.nix
+++ b/pkgs/applications/networking/browsers/mozilla-plugins/flashplayer-11/default.nix
@@ -36,7 +36,7 @@
let
# -> http://get.adobe.com/flashplayer/
- version = "11.2.202.457";
+ version = "11.2.202.460";
src =
if stdenv.system == "x86_64-linux" then
@@ -47,7 +47,7 @@ let
else rec {
inherit version;
url = "http://fpdownload.macromedia.com/get/flashplayer/pdc/${version}/install_flash_player_11_linux.x86_64.tar.gz";
- sha256 = "0nkr6p4h5l03ywsj1sbap359cl1x9rq3m12j9gvwvbvn935rmyr2";
+ sha256 = "152hhxismgvz6hkh5m8z5x1drpwflymd2zk3v96nszpkb2xxirnr";
}
else if stdenv.system == "i686-linux" then
if debug then
@@ -60,7 +60,7 @@ let
else rec {
inherit version;
url = "http://fpdownload.macromedia.com/get/flashplayer/pdc/${version}/install_flash_player_11_linux.i386.tar.gz";
- sha256 = "0qil5rb61bkn80fij31nv29q2wa7bxiwwxgy5zlkm2hsyrz3y4kc";
+ sha256 = "15655c3kzk1mk00737wgc52i4zz5jh9fkjgjs747qwiik5pnh7x1";
}
else throw "Flash Player is not supported on this platform";
diff --git a/pkgs/applications/networking/browsers/vimb/default.nix b/pkgs/applications/networking/browsers/vimb/default.nix
index 24a43d95ca9..3222e87ac65 100644
--- a/pkgs/applications/networking/browsers/vimb/default.nix
+++ b/pkgs/applications/networking/browsers/vimb/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
# Nixos default ca bundle
patchPhase = ''
- sed -i s,/etc/ssl/certs/ca-certificates.crt,${cacert}/ca-bundle.crt, src/config.def.h
+ sed -i s,/etc/ssl/certs/ca-certificates.crt,${cacert}/etc/ssl/certs/ca-bundle.crt, src/config.def.h
'';
buildInputs = [ makeWrapper gtk libsoup pkgconfig webkit gsettings_desktop_schemas ];
diff --git a/pkgs/applications/networking/browsers/vimprobable2/default.nix b/pkgs/applications/networking/browsers/vimprobable2/default.nix
index 7ab5c397abe..ad5f8aa4691 100644
--- a/pkgs/applications/networking/browsers/vimprobable2/default.nix
+++ b/pkgs/applications/networking/browsers/vimprobable2/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
# Nixos default ca bundle
patchPhase = ''
- sed -i s,/etc/ssl/certs/ca-certificates.crt,${cacert}/ca-bundle.crt, config.h
+ sed -i s,/etc/ssl/certs/ca-certificates.crt,${cacert}/etc/ssl/certs/ca-bundle.crt, config.h
'';
buildInputs = [ makeWrapper gtk libsoup libX11 perl pkgconfig webkit gsettings_desktop_schemas ];
diff --git a/pkgs/applications/networking/cluster/kubernetes/default.nix b/pkgs/applications/networking/cluster/kubernetes/default.nix
index fbfe4de23b8..a096d43b11c 100644
--- a/pkgs/applications/networking/cluster/kubernetes/default.nix
+++ b/pkgs/applications/networking/cluster/kubernetes/default.nix
@@ -2,27 +2,33 @@
stdenv.mkDerivation rec {
name = "kubernetes-${version}";
- version = "0.15.0";
+ version = "0.18.0";
src = fetchFromGitHub {
owner = "GoogleCloudPlatform";
repo = "kubernetes";
rev = "v${version}";
- sha256 = "1jiczhx01i8czm1gzd232z2ds2f1lvs5ifa9zjabhzw5ykfzdjg8";
+ sha256 = "1adbd5n2fs1278f6kz6pd23813w2k4pgcxjl21idflh8jafxsyj7";
};
buildInputs = [ makeWrapper which go iptables rsync ];
buildPhase = ''
+ GOPATH=$(pwd):$(pwd)/Godeps/_workspace
+ mkdir -p $(pwd)/Godeps/_workspace/src/github.com/GoogleCloudPlatform
+ ln -s $(pwd) $(pwd)/Godeps/_workspace/src/github.com/GoogleCloudPlatform/kubernetes
+
substituteInPlace "hack/lib/golang.sh" --replace "_cgo" ""
- GOPATH=$(pwd)
patchShebangs ./hack
hack/build-go.sh --use_go_build
+
+ (cd cluster/addons/dns/kube2sky && go build ./kube2sky.go)
'';
installPhase = ''
mkdir -p "$out/bin"
cp _output/local/go/bin/* "$out/bin/"
+ cp cluster/addons/dns/kube2sky/kube2sky "$out/bin/"
'';
preFixup = ''
diff --git a/pkgs/applications/networking/cluster/panamax/api/default.nix b/pkgs/applications/networking/cluster/panamax/api/default.nix
index dae0315a31b..a212ab5347c 100644
--- a/pkgs/applications/networking/cluster/panamax/api/default.nix
+++ b/pkgs/applications/networking/cluster/panamax/api/default.nix
@@ -62,8 +62,8 @@ stdenv.mkDerivation rec {
--prefix "PATH" : "$out/share/panamax-api/bin:${env.ruby}/bin:$PATH" \
--prefix "HOME" : "$out/share/panamax-api" \
--prefix "GEM_HOME" : "${env}/${env.ruby.gemPath}" \
- --prefix "OPENSSL_X509_CERT_FILE" : "${cacert}/ca-bundle.crt" \
- --prefix "SSL_CERT_FILE" : "${cacert}/ca-bundle.crt" \
+ --prefix "OPENSSL_X509_CERT_FILE" : "${cacert}/etc/ssl/certs/ca-bundle.crt" \
+ --prefix "SSL_CERT_FILE" : "${cacert}/etc/ssl/certs/ca-bundle.crt" \
--prefix "GEM_PATH" : "$out/share/panamax-api:${bundler}/${env.ruby.gemPath}"
'';
diff --git a/pkgs/applications/networking/feedreaders/rsstail/default.nix b/pkgs/applications/networking/feedreaders/rsstail/default.nix
index ee9d1dbbf8d..2d4b9741375 100644
--- a/pkgs/applications/networking/feedreaders/rsstail/default.nix
+++ b/pkgs/applications/networking/feedreaders/rsstail/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchFromGitHub, cppcheck, libmrss }:
-let version = "1.9"; in
+let version = "1.9.1"; in
stdenv.mkDerivation rec {
name = "rsstail-${version}";
src = fetchFromGitHub {
- sha256 = "0igkkhwzhi2cxbfirmq5xgaidnv0gdhmh2w7052xqpyvzg069faf";
- rev = "aab4fbcc5cdf82e439ea6abe562e9b648fc1a6ef";
+ sha256 = "0jhf7vr7y56r751wy4ix80iwhgxhk6mbbin8gnx59i457gf6sjl1";
+ rev = "1220d63aaa233961636f859d9a406536fffb64f4";
repo = "rsstail";
owner = "flok99";
};
diff --git a/pkgs/applications/networking/instant-messengers/fuze/default.nix b/pkgs/applications/networking/instant-messengers/fuze/default.nix
index 77fe37481d8..6b85e107d06 100644
--- a/pkgs/applications/networking/instant-messengers/fuze/default.nix
+++ b/pkgs/applications/networking/instant-messengers/fuze/default.nix
@@ -6,7 +6,7 @@ assert stdenv.system == "x86_64-linux";
let
curl_custom =
stdenv.lib.overrideDerivation curl (args: {
- configureFlags = args.configureFlags ++ ["--with-ca-bundle=${cacert}/ca-bundle.crt"] ;
+ configureFlags = args.configureFlags ++ ["--with-ca-bundle=${cacert}/etc/ssl/certs/ca-bundle.crt"] ;
} );
in
stdenv.mkDerivation {
diff --git a/pkgs/applications/networking/instant-messengers/mcabber/default.nix b/pkgs/applications/networking/instant-messengers/mcabber/default.nix
index 6c7e4797841..17ad6c25da7 100644
--- a/pkgs/applications/networking/instant-messengers/mcabber/default.nix
+++ b/pkgs/applications/networking/instant-messengers/mcabber/default.nix
@@ -14,6 +14,8 @@ stdenv.mkDerivation rec {
buildInputs = [ openssl ncurses pkgconfig glib loudmouth libotr gpgme ];
configureFlags = "--with-openssl=${openssl} --enable-modules --enable-otr";
+
+ doCheck = true;
meta = with stdenv.lib; {
homepage = http://mcabber.com/;
diff --git a/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix b/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix
index 812f00829e2..a68e0ee1104 100644
--- a/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix
+++ b/pkgs/applications/networking/instant-messengers/telegram-cli/default.nix
@@ -2,7 +2,7 @@
}:
stdenv.mkDerivation rec {
- name = "telegram-cli";
+ name = "telegram-cli-2014-03-04";
src = fetchgit {
url = "https://github.com/vysheng/tg.git";
diff --git a/pkgs/applications/networking/instant-messengers/telepathy/gabble/default.nix b/pkgs/applications/networking/instant-messengers/telepathy/gabble/default.nix
index b7cebd47cd7..a74885b2ce3 100644
--- a/pkgs/applications/networking/instant-messengers/telepathy/gabble/default.nix
+++ b/pkgs/applications/networking/instant-messengers/telepathy/gabble/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
buildInputs = [ libxml2 dbus_glib sqlite libsoup libnice telepathy_glib gnutls ]
++ stdenv.lib.optional doCheck dbus_daemon;
- configureFlags = "--with-ca-certificates=${cacert}/ca-bundle.crt";
+ configureFlags = "--with-ca-certificates=${cacert}/etc/ssl/certs/ca-bundle.crt";
enableParallelBuilding = true;
doCheck = true;
diff --git a/pkgs/applications/networking/irc/weechat/default.nix b/pkgs/applications/networking/irc/weechat/default.nix
index bbad1587982..8825e16b90f 100644
--- a/pkgs/applications/networking/irc/weechat/default.nix
+++ b/pkgs/applications/networking/irc/weechat/default.nix
@@ -4,12 +4,12 @@
, extraBuildInputs ? [] }:
stdenv.mkDerivation rec {
- version = "1.1.1";
+ version = "1.2";
name = "weechat-${version}";
src = fetchurl {
- url = "http://weechat.org/files/src/weechat-${version}.tar.gz";
- sha256 = "0j8kc2zsv7ybgq6wi0r8siyd3adl3528gymgmidijd78smbpwbx3";
+ url = "http://weechat.org/files/src/weechat-${version}.tar.bz2";
+ sha256 = "0kb8mykhzm7zcxsl6l6cia2n4nc9akiysg0v6d8xb51p3x002ibw";
};
buildInputs =
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
cacert cmake ]
++ extraBuildInputs;
- NIX_CFLAGS_COMPILE = "-I${python}/include/${python.libPrefix} -DCA_FILE=${cacert}/ca-bundle.crt";
+ NIX_CFLAGS_COMPILE = "-I${python}/include/${python.libPrefix} -DCA_FILE=${cacert}/etc/ssl/certs/ca-bundle.crt";
postInstall = ''
NIX_PYTHONPATH="$out/lib/${python.libPrefix}/site-packages"
diff --git a/pkgs/applications/networking/mailreaders/mailnag/default.nix b/pkgs/applications/networking/mailreaders/mailnag/default.nix
new file mode 100644
index 00000000000..e4253f5bff5
--- /dev/null
+++ b/pkgs/applications/networking/mailreaders/mailnag/default.nix
@@ -0,0 +1,46 @@
+{ stdenv, buildPythonPackage, fetchurl, gettext, gtk3, pythonPackages
+, gdk_pixbuf, libnotify, gst_all_1
+, libgnome_keyring3 ? null, networkmanager ? null
+}:
+
+buildPythonPackage rec {
+ name = "mailnag-${version}";
+ version = "1.1.0";
+
+ src = fetchurl {
+ url = "https://github.com/pulb/mailnag/archive/v${version}.tar.gz";
+ sha256 = "0li4kvxjmbz3nqg6bysgn2wdazqrd7gm9fym3rd7148aiqqwa91r";
+ };
+
+ # Sometimes the generated output isn't identical. It seems like there's a
+ # race condtion while patching the Mailnag/commons/dist_cfg.py file. This is
+ # a small workaround to produce deterministic builds.
+ # For more information see https://github.com/NixOS/nixpkgs/pull/8279
+ setupPyBuildFlags = [ "--build-base=$PWD" ];
+
+ buildInputs = [
+ gettext gtk3 pythonPackages.pygobject3 pythonPackages.dbus
+ pythonPackages.pyxdg gdk_pixbuf libnotify gst_all_1.gstreamer
+ gst_all_1.gst-plugins-base gst_all_1.gst-plugins-good
+ gst_all_1.gst-plugins-bad libgnome_keyring3 networkmanager
+ ];
+
+ preFixup = ''
+ for script in mailnag mailnag-config; do
+ wrapProgram $out/bin/$script \
+ --set GDK_PIXBUF_MODULE_FILE "$GDK_PIXBUF_MODULE_FILE" \
+ --prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH" \
+ --prefix GST_PLUGIN_SYSTEM_PATH_1_0 : "$GST_PLUGIN_SYSTEM_PATH_1_0" \
+ --prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH:$out/share" \
+ --prefix PYTHONPATH : "$PYTHONPATH"
+ done
+ '';
+
+ meta = with stdenv.lib; {
+ description = "An extensible mail notification daemon";
+ homepage = https://github.com/pulb/mailnag;
+ license = licenses.gpl2;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ jgeerds ];
+ };
+}
diff --git a/pkgs/applications/networking/mailreaders/thunderbird-bin/default.nix b/pkgs/applications/networking/mailreaders/thunderbird-bin/default.nix
index be276a4cfa2..23e4f397e82 100644
--- a/pkgs/applications/networking/mailreaders/thunderbird-bin/default.nix
+++ b/pkgs/applications/networking/mailreaders/thunderbird-bin/default.nix
@@ -121,7 +121,12 @@ stdenv.mkDerivation {
for executable in \
thunderbird mozilla-xremote-client thunderbird-bin plugin-container \
- updater libxul.so
+ updater \
+ components/libdbusservice.so components/libmozgnome.so \
+ libnssdbm3.so libsmime3.so libxul.so libprldap60.so libnss3.so \
+ libplc4.so libfreebl3.so libmozsqlite3.so libmozalloc.so libnspr4.so \
+ libssl3.so libldif60.so libsoftokn3.so libldap60.so libnssutil3.so \
+ libnssckbi.so libplds4.so
do
patchelf --set-rpath "$libPath" \
"$out/usr/lib/thunderbird-bin-${version}/$executable"
diff --git a/pkgs/applications/networking/newsreaders/liferea/default.nix b/pkgs/applications/networking/newsreaders/liferea/default.nix
index 26078c8e583..28baa2f7b67 100644
--- a/pkgs/applications/networking/newsreaders/liferea/default.nix
+++ b/pkgs/applications/networking/newsreaders/liferea/default.nix
@@ -6,14 +6,14 @@
}:
let pname = "liferea";
- version = "1.10.14";
+ version = "1.10.15";
in
stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "https://github.com/lwindolf/${pname}/releases/download/v${version}/${name}.tar.bz2";
- sha256 = "0szazfknarw6ivnr4flr928ar309pz2mv6alc6pk6l1i9jchcnfs";
+ sha256 = "0iicw42rf0vhq4xs81awlj5v3v7xfid3h5fh87f3bqbpn9pmifdg";
};
buildInputs = with gst_all_1; [
diff --git a/pkgs/applications/networking/p2p/opentracker/default.nix b/pkgs/applications/networking/p2p/opentracker/default.nix
index 32ceeb6fc8d..29dbd086a77 100644
--- a/pkgs/applications/networking/p2p/opentracker/default.nix
+++ b/pkgs/applications/networking/p2p/opentracker/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchgit, libowfat, zlib }:
stdenv.mkDerivation {
- name = "opentracker";
+ name = "opentracker-2014-08-03";
src = fetchgit {
url = "https://github.com/masroore/opentracker.git";
rev = "9a26b3d203755577879315ecc2b515d0e22793cb";
@@ -21,4 +21,4 @@ stdenv.mkDerivation {
platforms = platforms.linux;
description = "Bittorrent tracker project aiminf for minimal resource usage and is intended to run at your wlan router";
};
-}
\ No newline at end of file
+}
diff --git a/pkgs/applications/networking/remote/teamviewer/10.nix b/pkgs/applications/networking/remote/teamviewer/10.nix
index cd1833261f4..4b919d36fb6 100644
--- a/pkgs/applications/networking/remote/teamviewer/10.nix
+++ b/pkgs/applications/networking/remote/teamviewer/10.nix
@@ -1,5 +1,8 @@
-{ stdenv, fetchurl, libX11, libXtst, libXext, libXdamage, libXfixes, wineUnstable, makeWrapper, libXau
-, bash, patchelf, config }:
+{ stdenv, fetchurl, libX11, libXtst, libXext, libXdamage, libXfixes,
+wineUnstable, makeWrapper, libXau , bash, patchelf, config,
+acceptLicense ? false }:
+
+with stdenv.lib;
let
topath = "${wineUnstable}/bin";
@@ -37,11 +40,18 @@ stdenv.mkDerivation {
patchelf --set-rpath "${stdenv.cc.cc}/lib64:${stdenv.cc.cc}/lib:${libX11}/lib:${libXext}/lib:${libXau}/lib:${libXdamage}/lib:${libXfixes}/lib" $out/share/teamviewer/tv_bin/teamviewerd
patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" $out/share/teamviewer/tv_bin/teamviewerd
ln -s $out/share/teamviewer/tv_bin/teamviewerd $out/bin/
+ ${optionalString acceptLicense "
+ cat > $out/share/teamviewer/config/global.conf << EOF
+ [int32] EulaAccepted = 1
+ [int32] EulaAcceptedRevision = 6
+ EOF
+ "}
'';
meta = {
homepage = "http://www.teamviewer.com";
- license = stdenv.lib.licenses.unfree;
+ license = licenses.unfree;
description = "Desktop sharing application, providing remote support and online meetings";
+ maintainers = with maintainers; [ jagajaga ];
};
}
diff --git a/pkgs/applications/networking/syncthing/default.nix b/pkgs/applications/networking/syncthing/default.nix
index 1e26e61161c..30fda1e0fac 100644
--- a/pkgs/applications/networking/syncthing/default.nix
+++ b/pkgs/applications/networking/syncthing/default.nix
@@ -4,12 +4,12 @@ with goPackages;
buildGoPackage rec {
name = "syncthing-${version}";
- version = "0.11.7";
+ version = "0.11.8";
goPackagePath = "github.com/syncthing/syncthing";
src = fetchgit {
url = "git://github.com/syncthing/syncthing.git";
rev = "refs/tags/v${version}";
- sha256 = "7d928a255c61c7b89d460cc70c79bd8e85bef3e919c157f59d5709fef4153c8d";
+ sha256 = "fed98ac47fd84aecee7770dd59e5e68c5bc429d50b361f13b9ea2e28c3be62cf";
};
subPackages = [ "cmd/syncthing" ];
@@ -26,7 +26,7 @@ buildGoPackage rec {
homepage = http://syncthing.net/;
description = "Replaces Dropbox and BitTorrent Sync with something open, trustworthy and decentralized";
license = lib.licenses.mit;
- maintainers = with lib.maintainers; [ matejc ];
+ maintainers = with lib.maintainers; [ matejc theuni ];
platforms = with lib.platforms; unix;
};
}
diff --git a/pkgs/applications/office/abiword/default.nix b/pkgs/applications/office/abiword/default.nix
index 2aaf1e8f032..18ece7a7401 100644
--- a/pkgs/applications/office/abiword/default.nix
+++ b/pkgs/applications/office/abiword/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, pkgconfig, gtk3, libglade, libgnomecanvas, fribidi
, libpng, popt, libgsf, enchant, wv, librsvg, bzip2, libjpeg, perl
-, boost, libxslt
+, boost, libxslt, goffice, makeWrapper, iconTheme
}:
stdenv.mkDerivation rec {
@@ -16,9 +16,14 @@ stdenv.mkDerivation rec {
buildInputs =
[ pkgconfig gtk3 libglade librsvg bzip2 libgnomecanvas fribidi libpng popt
- libgsf enchant wv libjpeg perl boost libxslt
+ libgsf enchant wv libjpeg perl boost libxslt goffice makeWrapper iconTheme
];
+ postFixup = ''
+ wrapProgram "$out/bin/abiword" \
+ --prefix XDG_DATA_DIRS : "$XDG_ICON_DIRS:$GSETTINGS_SCHEMAS_PATH"
+ '';
+
meta = with stdenv.lib; {
description = "Word processing program, similar to Microsoft Word";
homepage = http://www.abisource.com/;
diff --git a/pkgs/applications/office/gnumeric/default.nix b/pkgs/applications/office/gnumeric/default.nix
index 02a78a2b2d1..e54dd591cfd 100644
--- a/pkgs/applications/office/gnumeric/default.nix
+++ b/pkgs/applications/office/gnumeric/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, pkgconfig, intltool, perl, perlXMLParser
-, gnome3, makeWrapper, gtk3
+, goffice, gnome3, makeWrapper, gtk3
}:
stdenv.mkDerivation rec {
@@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
# ToDo: optional libgda, python, introspection?
buildInputs = [
pkgconfig intltool perl perlXMLParser
- gnome3.goffice gtk3 makeWrapper gnome3.defaultIconTheme
+ goffice gtk3 makeWrapper gnome3.defaultIconTheme
];
enableParallelBuilding = true;
diff --git a/pkgs/applications/science/logic/abc/default.nix b/pkgs/applications/science/logic/abc/default.nix
index 174dfe8f2b2..236045fa335 100644
--- a/pkgs/applications/science/logic/abc/default.nix
+++ b/pkgs/applications/science/logic/abc/default.nix
@@ -2,12 +2,12 @@
stdenv.mkDerivation rec {
name = "abc-verifier-${version}";
- version = "20150406";
+ version = "20150614";
src = fetchhg {
url = "https://bitbucket.org/alanmi/abc";
- rev = "7d9c50a17d8676ad0c9792bb87102d7cb4b10667";
- sha256 = "1gg5jjfjjnv0fl7jsz37hzd9dpv58r8p0q8qvms0r289fcdxalcx";
+ rev = "38661894bc1287cad9bd35978bd252dbfe3e6c56";
+ sha256 = "04v0hkvj501r10pj3yrqrk2463d1d7lhl8dzfjwkmlbmlmpjlvvv";
};
buildInputs = [ readline ];
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
'';
meta = {
- description = "Sequential Logic Synthesis and Formal Verification";
+ description = "A tool for squential logic synthesis and ormal verification";
homepage = "www.eecs.berkeley.edu/~alanmi/abc/abc.htm";
license = stdenv.lib.licenses.mit;
platforms = stdenv.lib.platforms.unix;
diff --git a/pkgs/applications/science/logic/cvc4/default.nix b/pkgs/applications/science/logic/cvc4/default.nix
index 5b2e9c54d6f..769f86d5d77 100644
--- a/pkgs/applications/science/logic/cvc4/default.nix
+++ b/pkgs/applications/science/logic/cvc4/default.nix
@@ -1,23 +1,23 @@
-{stdenv, fetchurl, gmp, libantlr3c, boost}:
+{ stdenv, fetchurl, gmp, libantlr3c, boost, autoreconfHook }:
+
+stdenv.mkDerivation rec {
+ name = "cvc4-${version}";
+ version = "1.4";
-stdenv.mkDerivation {
- name = "cvc4-1.4";
src = fetchurl {
- url = http://cvc4.cs.nyu.edu/builds/src/cvc4-1.4.tar.gz;
+ url = "http://cvc4.cs.nyu.edu/builds/src/cvc4-${version}.tar.gz";
sha256 = "093h7zgv4z4ad503j30dpn8k2pz9m90pvd7gi5axdmwsxgwlzzkn";
};
- buildInputs = [ gmp libantlr3c boost ];
-
+ buildInputs = [ gmp libantlr3c boost autoreconfHook ];
preConfigure = "patchShebangs ./src/";
-
doChecks = true;
meta = with stdenv.lib; {
- description = "An efficient open-source automatic theorem prover for satisfiability modulo theories (SMT) problems";
- homepage = http://cvc4.cs.nyu.edu/web/;
- license = licenses.bsd3;
- platforms = platforms.unix;
- maintainers = with maintainers; [ vbgl ];
+ description = "A high-performance theorem prover and SMT solver";
+ homepage = http://cvc4.cs.nyu.edu/web/;
+ license = licenses.bsd3;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ vbgl thoughtpolice ];
};
}
diff --git a/pkgs/applications/science/logic/picosat/default.nix b/pkgs/applications/science/logic/picosat/default.nix
index 6c2cce0ea4b..fb5acc64c4d 100644
--- a/pkgs/applications/science/logic/picosat/default.nix
+++ b/pkgs/applications/science/logic/picosat/default.nix
@@ -1,41 +1,33 @@
-{stdenv, fetchurl }:
-
-let
- version = "936";
- pname = "picosat";
-
-in
+{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
- name = "${pname}-${version}";
+ name = "picosat-${version}";
+ version = "960";
src = fetchurl {
url = "http://fmv.jku.at/picosat/${name}.tar.gz";
- sha256 = "02hq68fmfjs085216wsj13ff6i1rhc652yscl16w9jzpfqzly91n";
+ sha256 = "05z8cfjk84mkna5ryqlq2jiksjifg3jhlgbijaq36sbn0i51iczd";
};
dontAddPrefix = true;
-
- # configureFlags = "--shared"; the ./configure file is broken and doesn't accept this parameter :(
- patchPhase = ''
- sed -e 's/^shared=no/shared=yes/' -i configure
- '';
+ configureFlags = "--shared";
installPhase = ''
- mkdir -p "$out"/bin
+ mkdir -p $out/bin $out/lib $out/include/picosat
cp picomus "$out"/bin
cp picosat "$out"/bin
- mkdir -p "$out"/lib
+
cp libpicosat.a "$out"/lib
cp libpicosat.so "$out"/lib
- mkdir -p "$out"/include/picosat
+
cp picosat.h "$out"/include/picosat
'';
meta = {
- homepage = http://fmv.jku.at/picosat/;
description = "SAT solver with proof and core support";
- license = stdenv.lib.licenses.mit;
- maintainers = [ stdenv.lib.maintainers.roconnor ];
+ homepage = http://fmv.jku.at/picosat/;
+ license = stdenv.lib.licenses.mit;
+ platforms = stdenv.lib.platforms.unix;
+ maintainers = with stdenv.lib.maintainers; [ roconnor thoughtpolice ];
};
}
diff --git a/pkgs/applications/science/logic/yices/default.nix b/pkgs/applications/science/logic/yices/default.nix
index 4e3b9b2a76b..5daaa444c12 100644
--- a/pkgs/applications/science/logic/yices/default.nix
+++ b/pkgs/applications/science/logic/yices/default.nix
@@ -1,36 +1,19 @@
-{ stdenv, fetchurl }:
+{ stdenv, fetchurl, gmp, gperf, autoreconfHook }:
-assert stdenv.isLinux;
-
-let
- libPath = stdenv.lib.makeLibraryPath [ stdenv.cc.libc ];
-in
stdenv.mkDerivation rec {
name = "yices-${version}";
- version = "2.2.1";
+ version = "2.3.1";
- src =
- if stdenv.system == "i686-linux"
- then fetchurl {
- url = "http://yices.csl.sri.com/cgi-bin/yices2-newdownload.cgi?file=yices-2.2.1-i686-pc-linux-gnu-static-gmp.tar.gz&accept=I+accept";
- name = "yices-${version}-i686.tar.gz";
- sha256 = "12jzk3kqlbqa5x6rl92cpzj7dch7gm7fnbj72wifvwgdj4zyhrra";
- }
- else fetchurl {
- url = "http://yices.csl.sri.com/cgi-bin/yices2-newdownload.cgi?file=yices-2.2.1-x86_64-unknown-linux-gnu-static-gmp.tar.gz&accept=I+accept";
- name = "yices-${version}-x86_64.tar.gz";
- sha256 = "0fpmihf6ykcg4qbsimkamgcwp4sl1xyxmz7q28ily91rd905ijaj";
- };
+ src = fetchurl {
+ url = "http://yices.csl.sri.com/cgi-bin/yices2-newnewdownload.cgi?file=yices-2.3.1-src.tar.gz&accept=I+Agree";
+ name = "yices-${version}-src.tar.gz";
+ sha256 = "1da70n0cah0dh3pk7fcrvjkszx9qmhc0csgl15jqa7bdh707k2zs";
+ };
- buildPhase = false;
- installPhase = ''
- mkdir -p $out/bin $out/lib $out/include
- cd bin && mv * $out/bin && cd ..
- cd lib && mv * $out/lib && cd ..
- cd include && mv * $out/include && cd ..
-
- patchelf --set-rpath ${libPath} $out/lib/libyices.so.${version}
- '';
+ configureFlags = [ "--with-static-gmp=${gmp}/lib/libgmp.a"
+ "--with-static-gmp-include-dir=${gmp}/include"
+ ];
+ buildInputs = [ gmp gperf autoreconfHook ];
meta = {
description = "A high-performance theorem prover and SMT solver";
diff --git a/pkgs/applications/science/logic/z3/default.nix b/pkgs/applications/science/logic/z3/default.nix
index 2296a28444b..fb3fb959ae6 100644
--- a/pkgs/applications/science/logic/z3/default.nix
+++ b/pkgs/applications/science/logic/z3/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "z3-${version}";
- version = "4.3.2";
+ version = "4.4.0";
src = fetchFromGitHub {
owner = "Z3Prover";
repo = "z3";
- rev = "ac21ffebdf1512da2a77dc46c47bde87cc3850f3";
- sha256 = "1y86akhpy41wx3gx7r8gvf7xbax7dj36ikj6gqh5a7p6r6maz9ci";
+ rev = "7f6ef0b6c0813f2e9e8f993d45722c0e5b99e152";
+ sha256 = "1xllvq9fcj4cz34biq2a9dn2sj33bdgrzyzkj26hqw70wkzv1kzx";
};
buildInputs = [ python ];
diff --git a/pkgs/applications/science/math/R/default.nix b/pkgs/applications/science/math/R/default.nix
index d0adb338207..72de0677e73 100644
--- a/pkgs/applications/science/math/R/default.nix
+++ b/pkgs/applications/science/math/R/default.nix
@@ -1,7 +1,7 @@
-{ stdenv, fetchurl, blas, bzip2, gfortran, liblapack, libX11, libXmu, libXt
+{ stdenv, fetchurl, bzip2, gfortran, libX11, libXmu, libXt
, libjpeg, libpng, libtiff, ncurses, pango, pcre, perl, readline, tcl
, texLive, tk, xz, zlib, less, texinfo, graphviz, icu, pkgconfig, bison
-, imake, which, jdk, atlas
+, imake, which, jdk, openblas
, withRecommendedPackages ? true
}:
@@ -13,10 +13,10 @@ stdenv.mkDerivation rec {
sha256 = "0dagyqgvi8i3nw158qi2zpwm04s4ffzvnmk5niaksvxs30zrbbpm";
};
- buildInputs = [ blas bzip2 gfortran liblapack libX11 libXmu libXt
+ buildInputs = [ bzip2 gfortran libX11 libXmu libXt
libXt libjpeg libpng libtiff ncurses pango pcre perl readline tcl
texLive tk xz zlib less texinfo graphviz icu pkgconfig bison imake
- which jdk atlas
+ which jdk openblas
];
patches = [ ./no-usr-local-search-paths.patch ];
@@ -25,8 +25,8 @@ stdenv.mkDerivation rec {
configureFlagsArray=(
--disable-lto
--with${stdenv.lib.optionalString (!withRecommendedPackages) "out"}-recommended-packages
- --with-blas="-L${atlas}/lib -lf77blas -latlas"
- --with-lapack="-L${liblapack}/lib -llapack"
+ --with-blas="-L${openblas}/lib -lopenblas"
+ --with-lapack="-L${openblas}/lib -lopenblas"
--with-readline
--with-tcltk --with-tcl-config="${tcl}/lib/tclConfig.sh" --with-tk-config="${tk}/lib/tkConfig.sh"
--with-cairo
diff --git a/pkgs/applications/science/math/jags/default.nix b/pkgs/applications/science/math/jags/default.nix
index 785c2460bb4..9d70d268691 100644
--- a/pkgs/applications/science/math/jags/default.nix
+++ b/pkgs/applications/science/math/jags/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, gfortran, liblapack, blas}:
+{stdenv, fetchurl, gfortran, openblas}:
stdenv.mkDerivation rec {
name = "JAGS-3.4.0";
@@ -6,7 +6,8 @@ stdenv.mkDerivation rec {
url = "mirror://sourceforge/mcmc-jags/${name}.tar.gz";
sha256 = "0ayqsz9kkmbss7mxlwr34ch2z1vsb65lryjzqpprab1ccyiaksib";
};
- buildInputs = [gfortran liblapack blas];
+ buildInputs = [gfortran openblas];
+ configureFlags = [ "--with-blas=-lopenblas" "--with-lapack=-lopenblas" ];
meta = {
description = "Just Another Gibbs Sampler";
diff --git a/pkgs/applications/science/misc/golly/default.nix b/pkgs/applications/science/misc/golly/default.nix
index 63a0be47c47..bf6eabef909 100644
--- a/pkgs/applications/science/misc/golly/default.nix
+++ b/pkgs/applications/science/misc/golly/default.nix
@@ -3,11 +3,11 @@ let
s = # Generated upstream information
rec {
baseName="golly";
- version="2.6";
+ version="2.7";
name="${baseName}-${version}";
- hash="1n1k3yf23ymlwq4k6p4v2g04qd29pg2rabr4l7m9bj2b2j1zkqhz";
- url="mirror://sourceforge/project/golly/golly/golly-2.6/golly-2.6-src.tar.gz";
- sha256="1n1k3yf23ymlwq4k6p4v2g04qd29pg2rabr4l7m9bj2b2j1zkqhz";
+ hash="0wfr9dhdbwg2cbcl7g2s1h9pmsm1lkjncbs9m0df82bcw516xs2f";
+ url="mirror://sourceforge/project/golly/golly/golly-2.7/golly-2.7-src.tar.gz";
+ sha256="0wfr9dhdbwg2cbcl7g2s1h9pmsm1lkjncbs9m0df82bcw516xs2f";
};
buildInputs = [
wxGTK perl python zlib
diff --git a/pkgs/applications/version-management/bazaar/default.nix b/pkgs/applications/version-management/bazaar/default.nix
index ad6f0c50a37..c3b238eeb0a 100644
--- a/pkgs/applications/version-management/bazaar/default.nix
+++ b/pkgs/applications/version-management/bazaar/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
patches = [ ./add_certificates.patch ];
postPatch = ''
substituteInPlace bzrlib/transport/http/_urllib2_wrappers.py \
- --subst-var-by "certPath" "${cacert}/ca-bundle.crt"
+ --subst-var-by "certPath" "${cacert}/etc/ssl/certs/ca-bundle.crt"
'';
diff --git a/pkgs/applications/version-management/git-and-tools/git/default.nix b/pkgs/applications/version-management/git-and-tools/git/default.nix
index 60bfaa86199..29ec3b50786 100644
--- a/pkgs/applications/version-management/git-and-tools/git/default.nix
+++ b/pkgs/applications/version-management/git-and-tools/git/default.nix
@@ -9,7 +9,7 @@
}:
let
- version = "2.4.1";
+ version = "2.4.2";
svn = subversionClient.override { perlBindings = true; };
in
@@ -18,7 +18,7 @@ stdenv.mkDerivation {
src = fetchurl {
url = "https://www.kernel.org/pub/software/scm/git/git-${version}.tar.xz";
- sha256 = "195d61f98jj53jq0w3kfphpyk51h7fylpahc558id79ccc4ii1bj";
+ sha256 = "1rf942v2yk49xgy0asgk4vi4mmshpz823iyvrxc5n5y2v0ffq0a8";
};
patches = [
diff --git a/pkgs/applications/version-management/mercurial/default.nix b/pkgs/applications/version-management/mercurial/default.nix
index dee2abd2b1f..565c95af508 100644
--- a/pkgs/applications/version-management/mercurial/default.nix
+++ b/pkgs/applications/version-management/mercurial/default.nix
@@ -44,13 +44,16 @@ stdenv.mkDerivation {
mkdir -p $out/etc/mercurial
cat >> $out/etc/mercurial/hgrc << EOF
[web]
- cacerts = ${cacert}/ca-bundle.crt
+ cacerts = ${cacert}/etc/ssl/certs/ca-bundle.crt
EOF
# copy hgweb.cgi to allow use in apache
mkdir -p $out/share/cgi-bin
cp -v hgweb.cgi contrib/hgweb.wsgi $out/share/cgi-bin
chmod u+x $out/share/cgi-bin/hgweb.cgi
+
+ # install bash completion
+ install -D -v contrib/bash_completion $out/share/bash-completion/completions/mercurial
'';
meta = {
diff --git a/pkgs/applications/version-management/mr/default.nix b/pkgs/applications/version-management/mr/default.nix
index d52802e42f1..68bef621bc2 100644
--- a/pkgs/applications/version-management/mr/default.nix
+++ b/pkgs/applications/version-management/mr/default.nix
@@ -1,12 +1,12 @@
{ stdenv, fetchurl, perl }:
stdenv.mkDerivation rec {
- version = "1.20141024";
+ version = "1.20150503";
name = "mr-${version}";
src = fetchurl {
url = "https://github.com/joeyh/myrepos/archive/${version}.tar.gz";
- sha256 = "7b68183476867d15d6f111fc9678335b94824dcfa09f07c761a72d64cdf5ad4a";
+ sha256 = "12cf8kmn13446rszmah5wws5p2k2gjp6y4505sy1r14qnahf4qbf";
};
buildInputs = [ perl ];
diff --git a/pkgs/applications/video/byzanz/default.nix b/pkgs/applications/video/byzanz/default.nix
index 79b9ab92ad9..abacdf7a2d5 100644
--- a/pkgs/applications/video/byzanz/default.nix
+++ b/pkgs/applications/video/byzanz/default.nix
@@ -16,6 +16,8 @@ stdenv.mkDerivation rec {
./autogen.sh --prefix=$out
'';
+ NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations";
+
buildInputs = [ which gnome3.gnome_common glib intltool pkgconfig libtool cairo gtk3 gst_all_1.gstreamer gst_all_1.gst-plugins-base ];
meta = with stdenv.lib; {
diff --git a/pkgs/applications/video/makemkv/default.nix b/pkgs/applications/video/makemkv/default.nix
index 583c800a8b4..7d604101f4b 100644
--- a/pkgs/applications/video/makemkv/default.nix
+++ b/pkgs/applications/video/makemkv/default.nix
@@ -4,17 +4,17 @@
stdenv.mkDerivation rec {
name = "makemkv-${ver}";
- ver = "1.9.2";
+ ver = "1.9.4";
builder = ./builder.sh;
src_bin = fetchurl {
url = "http://www.makemkv.com/download/makemkv-bin-${ver}.tar.gz";
- sha256 = "0hjby7imja9sg2h68al81n4zl72mc3y3fqmf61sf1sad4njs9bkj";
+ sha256 = "0xr5bfbpzd1s9fyxbwj0crpgi57hm4wrm1dybx13lv4n6xdj2ww0";
};
src_oss = fetchurl {
url = "http://www.makemkv.com/download/makemkv-oss-${ver}.tar.gz";
- sha256 = "074scfz835jynzmb28i8q44hc6ixvfg3crgirmy02bbpxakyp1v6";
+ sha256 = "0gpmyp2g44piaj47a52ik5i3sk5flbs8kqlqmjxnqkv16s01vfra";
};
buildInputs = [openssl qt4 mesa zlib pkgconfig libav];
diff --git a/pkgs/build-support/agda/default.nix b/pkgs/build-support/agda/default.nix
index 69c4897d1a4..8a871cfeb51 100644
--- a/pkgs/build-support/agda/default.nix
+++ b/pkgs/build-support/agda/default.nix
@@ -7,100 +7,86 @@
, extension ? (self: super: {})
}:
+with stdenv.lib.strings;
+
let
- optionalString = stdenv.lib.optionalString;
- filter = stdenv.lib.filter;
- concatMapStringsSep = stdenv.lib.strings.concatMapStringsSep;
- concatMapStrings = stdenv.lib.strings.concatMapStrings;
- unwords = stdenv.lib.strings.concatStringsSep " ";
- mapInside = xs: unwords (map (x: x + "/*") xs);
-in
-{ mkDerivation = args:
- let
- postprocess = x: x // {
- sourceDirectories = filter (y: !(y == null)) x.sourceDirectories;
- propagatedBuildInputs = filter (y : ! (y == null)) x.propagatedBuildInputs;
- propagatedUserEnvPkgs = filter (y : ! (y == null)) x.propagatedUserEnvPkgs;
- everythingFile = if x.everythingFile == "" then "Everything.agda" else x.everythingFile;
+ defaults = self : {
+ # There is no Hackage for Agda so we require src.
+ inherit (self) src name;
- passthru = { inherit (x) extras; };
- extras = null;
- };
+ isAgdaPackage = true;
- defaults = self : {
- # There is no Hackage for Agda so we require src.
- inherit (self) src name;
+ buildInputs = [ Agda ] ++ self.buildDepends;
+ buildDepends = [];
- isAgdaPackage = true;
+ buildDependsAgda = stdenv.lib.filter
+ (dep: dep ? isAgdaPackage && dep.isAgdaPackage)
+ self.buildDepends;
+ buildDependsAgdaShareAgda = map (x: x + "/share/agda") self.buildDependsAgda;
- buildInputs = [ Agda ] ++ self.buildDepends;
- buildDepends = [];
+ # Not much choice here ;)
+ LANG = "en_US.UTF-8";
+ LOCALE_ARCHIVE = stdenv.lib.optionalString
+ stdenv.isLinux
+ "${glibcLocales}/lib/locale/locale-archive";
- buildDependsAgda = filter
- (dep: dep ? isAgdaPackage && dep.isAgdaPackage)
- self.buildDepends;
- buildDependsAgdaShareAgda = map (x: x + "/share/agda") self.buildDependsAgda;
+ everythingFile = "Everything.agda";
- # Not much choice here ;)
- LANG = "en_US.UTF-8";
- LOCALE_ARCHIVE = optionalString stdenv.isLinux "${glibcLocales}/lib/locale/locale-archive";
+ propagatedBuildInputs = self.buildDependsAgda;
+ propagatedUserEnvPkgs = self.buildDependsAgda;
- everythingFile = "Everything.agda";
+ # Immediate source directories under which modules can be found.
+ sourceDirectories = [ ];
- propagatedBuildInputs = self.buildDependsAgda;
- propagatedUserEnvPkgs = self.buildDependsAgda;
+ # This is used if we have a top-level element that only serves
+ # as the container for the source and we only care about its
+ # contents. The directories put here will have their
+ # *contents* copied over as opposed to sourceDirectories which
+ # would make a direct copy of the whole thing.
+ topSourceDirectories = [ "src" ];
- # Immediate source directories under which modules can be found.
- sourceDirectories = [ ];
+ # FIXME: `dirOf self.everythingFile` is what we really want, not hardcoded "./"
+ includeDirs = self.buildDependsAgdaShareAgda
+ ++ self.sourceDirectories ++ self.topSourceDirectories
+ ++ [ "." ];
+ buildFlags = concatStringsSep " " (map (x: "-i " + x) self.includeDirs);
- # This is used if we have a top-level element that only serves
- # as the container for the source and we only care about its
- # contents. The directories put here will have their
- # *contents* copied over as opposed to sourceDirectories which
- # would make a direct copy of the whole thing.
- topSourceDirectories = [ "src" ];
+ agdaWithArgs = "${Agda}/bin/agda ${self.buildFlags}";
- # FIXME: `dirOf self.everythingFile` is what we really want, not hardcoded "./"
- includeDirs = self.buildDependsAgdaShareAgda
- ++ self.sourceDirectories ++ self.topSourceDirectories
- ++ [ "." ];
- buildFlags = unwords (map (x: "-i " + x) self.includeDirs);
+ buildPhase = ''
+ runHook preBuild
+ ${self.agdaWithArgs} ${self.everythingFile}
+ runHook postBuild
+ '';
- agdaWithArgs = "${Agda}/bin/agda ${self.buildFlags}";
+ installPhase = let
+ srcFiles = self.sourceDirectories
+ ++ map (x: x + "/*") self.topSourceDirectories;
+ in ''
+ runHook preInstall
+ mkdir -p $out/share/agda
+ cp -pR ${concatStringsSep " " srcFiles} $out/share/agda
+ runHook postInstall
+ '';
- buildPhase = ''
- runHook preBuild
- ${self.agdaWithArgs} ${self.everythingFile}
- runHook postBuild
- '';
-
- installPhase = ''
- runHook preInstall
- mkdir -p $out/share/agda
- cp -pR ${unwords self.sourceDirectories} ${mapInside self.topSourceDirectories} $out/share/agda
- runHook postInstall
- '';
-
- # Optionally-built conveniences
- extras = {
+ passthru = {
+ env = stdenv.mkDerivation {
+ name = "interactive-${self.name}";
+ inherit (self) LANG LOCALE_ARCHIVE;
+ AGDA_PACKAGE_PATH = concatMapStrings (x: x + ":") self.buildDependsAgdaShareAgda;
+ buildInputs = let
# Makes a wrapper available to the user. Very useful in
# nix-shell where all dependencies are -i'd.
agdaWrapper = writeScriptBin "agda" ''
${self.agdaWithArgs} "$@"
'';
-
- # Use this to stick `agdaWrapper` at the front of the PATH:
- #
- # agda.mkDerivation (self: { PATH = self.extras.agdaWrapperPATH; })
- #
- # Not sure this is the best way to handle conflicts....
- agdaWrapperPATH = "${self.extras.agdaWrapper}/bin:$PATH";
-
- AGDA_PACKAGE_PATH = concatMapStrings (x: x + ":") self.buildDependsAgdaShareAgda;
- };
+ in [agdaWrapper] ++ self.buildDepends;
};
- in stdenv.mkDerivation
- (postprocess (let super = defaults self // args self;
- self = super // extension self super;
- in self));
+ };
+ };
+in
+{ mkDerivation = args: let
+ super = defaults self // args self;
+ self = super // extension self super;
+ in stdenv.mkDerivation self;
}
diff --git a/pkgs/build-support/build-dotnet-package/default.nix b/pkgs/build-support/build-dotnet-package/default.nix
new file mode 100644
index 00000000000..00be987af75
--- /dev/null
+++ b/pkgs/build-support/build-dotnet-package/default.nix
@@ -0,0 +1,109 @@
+{ stdenv, lib, makeWrapper, pkgconfig, mono, dotnetbuildhelpers }:
+
+attrsOrig @
+{ baseName
+, version
+, buildInputs ? []
+, xBuildFiles ? [ ]
+, xBuildFlags ? [ "/p:Configuration=Release" ]
+, outputFiles ? [ "bin/Release/*" ]
+, dllFiles ? [ "*.dll" ]
+, exeFiles ? [ "*.exe" ]
+, ... }:
+ let
+ arrayToShell = (a: toString (map (lib.escape (lib.stringToCharacters "\\ ';$`()|<>\t") ) a));
+
+ attrs = {
+ name = "${baseName}-${version}";
+
+ buildInputs = [
+ pkgconfig
+ mono
+ dotnetbuildhelpers
+ makeWrapper
+ ] ++ buildInputs;
+
+ configurePhase = ''
+ runHook preConfigure
+
+ [ -z "$dontPlacateNuget" ] && placate-nuget.sh
+ [ -z "$dontPlacatePaket" ] && placate-paket.sh
+ [ -z "$dontPatchFSharpTargets" ] && patch-fsharp-targets.sh
+
+ runHook postConfigure
+ '';
+
+ buildPhase = ''
+ runHook preBuild
+
+ echo Building dotNET packages...
+
+ # Probably needs to be moved to fsharp
+ if pkg-config FSharp.Core
+ then
+ export FSharpTargetsPath="$(dirname $(pkg-config FSharp.Core --variable=Libraries))/Microsoft.FSharp.Targets"
+ fi
+
+ ran=""
+ for xBuildFile in ${arrayToShell xBuildFiles} ''${xBuildFilesExtra}
+ do
+ ran="yes"
+ xbuild ${arrayToShell xBuildFlags} ''${xBuildFlagsArray} $xBuildFile
+ done
+
+ [ -z "$ran" ] && xbuild ${arrayToShell xBuildFlags} ''${xBuildFlagsArray}
+
+ runHook postBuild
+ '';
+
+ dontStrip = true;
+
+ installPhase = ''
+ runHook preInstall
+
+ target="$out/lib/dotnet/${baseName}"
+ mkdir -p "$target"
+
+ cp -rv ${arrayToShell outputFiles} "''${outputFilesArray[@]}" "$target"
+
+ if [ -z "$dontRemoveDuplicatedDlls" ]
+ then
+ pushd "$out"
+ remove-duplicated-dlls.sh
+ popd
+ fi
+
+ set -f
+ for dllPattern in ${arrayToShell dllFiles} ''${dllFilesArray[@]}
+ do
+ set +f
+ for dll in "$target"/$dllPattern
+ do
+ [ -f "$dll" ] || continue
+ if pkg-config $(basename -s .dll "$dll")
+ then
+ echo "$dll already exported by a buildInputs, not re-exporting"
+ else
+ ${dotnetbuildhelpers}/bin/create-pkg-config-for-dll.sh "$out/lib/pkgconfig" "$dll"
+ fi
+ done
+ done
+
+ set -f
+ for exePattern in ${arrayToShell exeFiles} ''${exeFilesArray[@]}
+ do
+ set +f
+ for exe in "$target"/$exePattern
+ do
+ [ -f "$exe" ] || continue
+ mkdir -p "$out"/bin
+ commandName="$(basename -s .exe "$(echo "$exe" | tr "[A-Z]" "[a-z]")")"
+ makeWrapper "${mono}/bin/mono \"$exe\"" "$out"/bin/"$commandName"
+ done
+ done
+
+ runHook postInstall
+ '';
+ };
+ in
+ stdenv.mkDerivation (attrs // (builtins.removeAttrs attrsOrig [ "buildInputs" ] ))
diff --git a/pkgs/build-support/dotnetbuildhelpers/create-pkg-config-for-dll.sh b/pkgs/build-support/dotnetbuildhelpers/create-pkg-config-for-dll.sh
new file mode 100644
index 00000000000..37914170452
--- /dev/null
+++ b/pkgs/build-support/dotnetbuildhelpers/create-pkg-config-for-dll.sh
@@ -0,0 +1,23 @@
+#!/usr/bin/env bash
+
+targetDir="$1"
+dllFullPath="$2"
+
+dllVersion="$(monodis --assembly "$dllFullPath" | grep ^Version: | cut -f 2 -d : | xargs)"
+[ -z "$dllVersion" ] && echo "Defaulting dllVersion to 0.0.0" && dllVersion="0.0.0"
+dllFileName="$(basename $dllFullPath)"
+dllRootName="$(basename -s .dll $dllFileName)"
+targetPcFile="$targetDir"/"$dllRootName".pc
+
+mkdir -p "$targetDir"
+
+cat > $targetPcFile << EOF
+Libraries=$dllFullPath
+
+Name: $dllRootName
+Description: $dllRootName
+Version: $dllVersion
+Libs: -r:$dllFileName
+EOF
+
+echo "Created $targetPcFile"
diff --git a/pkgs/build-support/dotnetbuildhelpers/default.nix b/pkgs/build-support/dotnetbuildhelpers/default.nix
new file mode 100644
index 00000000000..ed0d4f790c8
--- /dev/null
+++ b/pkgs/build-support/dotnetbuildhelpers/default.nix
@@ -0,0 +1,18 @@
+{ helperFunctions, mono, pkgconfig }:
+ helperFunctions.runCommand
+ "dotnetbuildhelpers"
+ { preferLocalBuild = true; }
+ ''
+ target="$out/bin"
+ mkdir -p "$target"
+
+ for script in ${./create-pkg-config-for-dll.sh} ${./patch-fsharp-targets.sh} ${./remove-duplicated-dlls.sh} ${./placate-nuget.sh} ${./placate-paket.sh}
+ do
+ scriptName="$(basename "$script" | cut -f 2- -d -)"
+ cp -v "$script" "$target"/"$scriptName"
+ chmod 755 "$target"/"$scriptName"
+ patchShebangs "$target"/"$scriptName"
+ substituteInPlace "$target"/"$scriptName" --replace pkg-config ${pkgconfig}/bin/pkg-config
+ substituteInPlace "$target"/"$scriptName" --replace monodis ${mono}/bin/monodis
+ done
+ ''
diff --git a/pkgs/build-support/dotnetbuildhelpers/patch-fsharp-targets.sh b/pkgs/build-support/dotnetbuildhelpers/patch-fsharp-targets.sh
new file mode 100644
index 00000000000..3f81cc73e80
--- /dev/null
+++ b/pkgs/build-support/dotnetbuildhelpers/patch-fsharp-targets.sh
@@ -0,0 +1,20 @@
+#!/bin/bash
+
+# Some project files look for F# targets in $(FSharpTargetsPath)
+# so it's a good idea to add something like this to your ~/.bash_profile:
+
+# export FSharpTargetsPath=$(dirname $(which fsharpc))/../lib/mono/4.0/Microsoft.FSharp.Targets
+
+# In build scripts, you would add somehting like this:
+
+# export FSharpTargetsPath="${fsharp}/lib/mono/4.0/Microsoft.FSharp.Targets"
+
+# However, some project files look for F# targets in the main Mono directory. When that happens
+# patch the project files using this script so they will look in $(FSharpTargetsPath) instead.
+
+echo "Patching F# targets in fsproj files..."
+
+find -iname \*.fsproj -print -exec \
+ sed --in-place=.bak \
+ -e 's,\([^<]*\),\1,'g \
+ {} \;
diff --git a/pkgs/build-support/dotnetbuildhelpers/placate-nuget.sh b/pkgs/build-support/dotnetbuildhelpers/placate-nuget.sh
new file mode 100644
index 00000000000..8a7f36522a3
--- /dev/null
+++ b/pkgs/build-support/dotnetbuildhelpers/placate-nuget.sh
@@ -0,0 +1,7 @@
+#!/usr/bin/env bash
+
+echo Placating Nuget in nuget.targets
+find -iname nuget.targets -print -exec sed --in-place=bak -e 's,mono --runtime[^<]*,true NUGET PLACATED BY buildDotnetPackage,g' {} \;
+
+echo Just to be sure, replacing Nuget executables by empty files.
+find . -iname nuget.exe \! -size 0 -exec mv -v {} {}.bak \; -exec touch {} \;
diff --git a/pkgs/build-support/dotnetbuildhelpers/placate-paket.sh b/pkgs/build-support/dotnetbuildhelpers/placate-paket.sh
new file mode 100644
index 00000000000..0dbf1eecbad
--- /dev/null
+++ b/pkgs/build-support/dotnetbuildhelpers/placate-paket.sh
@@ -0,0 +1,7 @@
+#!/usr/bin/env bash
+
+echo Placating Paket in paket.targets
+find -iname paket.targets -print -exec sed --in-place=bak -e 's,mono --runtime[^<]*,true PAKET PLACATED BY buildDotnetPackage,g' {} \;
+
+echo Just to be sure, replacing Paket executables by empty files.
+find . -iname paket\*.exe \! -size 0 -exec mv -v {} {}.bak \; -exec touch {} \;
diff --git a/pkgs/build-support/dotnetbuildhelpers/remove-duplicated-dlls.sh b/pkgs/build-support/dotnetbuildhelpers/remove-duplicated-dlls.sh
new file mode 100644
index 00000000000..d8d29912c8f
--- /dev/null
+++ b/pkgs/build-support/dotnetbuildhelpers/remove-duplicated-dlls.sh
@@ -0,0 +1,22 @@
+#!/usr/bin/env bash
+
+IFS="
+"
+
+for dll in $(find -iname \*.dll)
+do
+ baseName="$(basename "$dll" | sed "s/.dll$//i")"
+ if pkg-config "$baseName"
+ then
+ candidateDll="$(pkg-config "$baseName" --variable=Libraries)"
+
+ if diff "$dll" "$candidateDll" >/dev/null
+ then
+ echo "$dll is identical to $candidateDll. Substituting..."
+ rm -vf "$dll"
+ ln -sv "$candidateDll" "$dll"
+ else
+ echo "$dll and $candidateDll share the same name but have different contents, leaving alone."
+ fi
+ fi
+done
diff --git a/pkgs/build-support/fetchgit/default.nix b/pkgs/build-support/fetchgit/default.nix
index 7259fa8ff4c..8ddb6a85d0c 100644
--- a/pkgs/build-support/fetchgit/default.nix
+++ b/pkgs/build-support/fetchgit/default.nix
@@ -54,7 +54,7 @@ stdenv.mkDerivation {
inherit url rev leaveDotGit fetchSubmodules deepClone branchName;
- GIT_SSL_CAINFO = "${cacert}/ca-bundle.crt";
+ GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt";
impureEnvVars = [
# We borrow these environment variables from the caller to allow
diff --git a/pkgs/build-support/fetchnuget/default.nix b/pkgs/build-support/fetchnuget/default.nix
new file mode 100644
index 00000000000..95bb7b7cd8d
--- /dev/null
+++ b/pkgs/build-support/fetchnuget/default.nix
@@ -0,0 +1,40 @@
+{ stdenv, fetchurl, buildDotnetPackage, unzip }:
+
+attrs @
+{ baseName
+, version
+, url ? "https://www.nuget.org/api/v2/package/${baseName}/${version}"
+, sha256 ? ""
+, md5 ? ""
+, ...
+}:
+ buildDotnetPackage ({
+ src = fetchurl {
+ inherit url sha256 md5;
+ name = "${baseName}.${version}.zip";
+ };
+
+ sourceRoot = ".";
+
+ buildInputs = [ unzip ];
+
+ dontBuild = true;
+
+ preInstall = ''
+ function traverseRename () {
+ for e in *
+ do
+ t="$(echo "$e" | sed -e "s/%20/\ /g" -e "s/%2B/+/g")"
+ [ "$t" != "$e" ] && mv -vn "$e" "$t"
+ if [ -d "$t" ]
+ then
+ cd "$t"
+ traverseRename
+ cd ..
+ fi
+ done
+ }
+
+ traverseRename
+ '';
+ } // attrs)
diff --git a/pkgs/build-support/fetchurl/mirrors.nix b/pkgs/build-support/fetchurl/mirrors.nix
index 7f61ddc77db..2a3dbb40a2b 100644
--- a/pkgs/build-support/fetchurl/mirrors.nix
+++ b/pkgs/build-support/fetchurl/mirrors.nix
@@ -14,8 +14,6 @@ rec {
http://heanet.dl.sourceforge.net/sourceforge/
http://surfnet.dl.sourceforge.net/sourceforge/
http://dfn.dl.sourceforge.net/sourceforge/
- http://mesh.dl.sourceforge.net/sourceforge/
- http://ovh.dl.sourceforge.net/sourceforge/
http://osdn.dl.sourceforge.net/sourceforge/
http://kent.dl.sourceforge.net/sourceforge/
];
@@ -153,10 +151,9 @@ rec {
# ImageMagick mirrors, see http://www.imagemagick.org/script/download.php.
imagemagick = [
- ftp://ftp.nluug.nl/pub/ImageMagick/
+ http://www.imagemagick.org/download/
+ ftp://ftp.sunet.se/pub/multimedia/graphics/ImageMagick/ # also contains older versions removed from most mirrors
ftp://ftp.imagemagick.org/pub/ImageMagick/
- ftp://ftp.imagemagick.net/pub/ImageMagick/
- ftp://ftp.sunet.se/pub/multimedia/graphics/ImageMagick/
];
# CPAN mirrors.
@@ -339,7 +336,6 @@ rec {
http://cran.hafro.is/
http://ftp.iitm.ac.in/cran/
http://cran.repo.bppt.go.id/
- http://cran.unej.ac.id/
http://cran.um.ac.ir/
http://ftp.heanet.ie/mirrors/cran.r-project.org/
http://cran.mirror.garr.it/mirrors/CRAN/
diff --git a/pkgs/build-support/rust/fetch-cargo-deps b/pkgs/build-support/rust/fetch-cargo-deps
index 69eb404e644..ae1ca62050f 100755
--- a/pkgs/build-support/rust/fetch-cargo-deps
+++ b/pkgs/build-support/rust/fetch-cargo-deps
@@ -24,10 +24,12 @@ export CARGO_HOME=$out
cd $src
if [[ ! -f Cargo.lock ]]; then
+ echo
echo "ERROR: The Cargo.lock file doesn't exist"
echo
echo "Cargo.lock is needed to make sure that depsSha256 doesn't change"
echo "when the registry is updated."
+ echo
exit 1
fi
diff --git a/pkgs/build-support/rust/fetchcargo.nix b/pkgs/build-support/rust/fetchcargo.nix
index 1f5166d5c43..5dd80bd4aa5 100644
--- a/pkgs/build-support/rust/fetchcargo.nix
+++ b/pkgs/build-support/rust/fetchcargo.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation {
outputHashMode = "recursive";
outputHash = sha256;
- SSL_CERT_FILE = "${cacert}/ca-bundle.crt";
+ SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt";
impureEnvVars = [ "http_proxy" "https_proxy" "ftp_proxy" "all_proxy" "no_proxy" ];
preferLocalBuild = true;
diff --git a/pkgs/build-support/vm/default.nix b/pkgs/build-support/vm/default.nix
index a9f9f0d184c..c4fefe4d501 100644
--- a/pkgs/build-support/vm/default.nix
+++ b/pkgs/build-support/vm/default.nix
@@ -187,6 +187,7 @@ rec {
# then don't start the build again, but instead drop the user into
# an interactive shell.
if test -n "$origBuilder" -a ! -e /.debug; then
+ exec < /dev/null
${coreutils}/bin/touch /.debug
$origBuilder $origArgs
echo $? > /tmp/xchg/in-vm-exit
@@ -1709,22 +1710,22 @@ rec {
};
debian8i386 = {
- name = "debian-8.0-jessie-i386";
- fullName = "Debian 8.0 Jessie (i386)";
+ name = "debian-8.1-jessie-i386";
+ fullName = "Debian 8.1 Jessie (i386)";
packagesList = fetchurl {
url = mirror://debian/dists/jessie/main/binary-i386/Packages.xz;
- sha256 = "0lrv1lnd595c346ci7z8ja2b0rm2gx5r4hwp0wbp9lzxi8k5nk1d";
+ sha256 = "e658c2aebc3c0bc529e89de3ad916a71372f0a80161111d86a7dab1026644507";
};
urlPrefix = mirror://debian;
packages = commonDebianPackages;
};
debian8x86_64 = {
- name = "debian-8.0-jessie-amd64";
- fullName = "Debian 8.0 Jessie (amd64)";
+ name = "debian-8.1-jessie-amd64";
+ fullName = "Debian 8.1 Jessie (amd64)";
packagesList = fetchurl {
url = mirror://debian/dists/jessie/main/binary-amd64/Packages.xz;
- sha256 = "0hhagvybciy89wr1cy9dgdfki668dvcywgbz4w01qwivyd6dsia4";
+ sha256 = "265907f3cb05aff5f653907e9babd4704902f78cd5e355d4cd4ae590e4d5b043";
};
urlPrefix = mirror://debian;
packages = commonDebianPackages;
diff --git a/pkgs/data/fonts/andagii/default.nix b/pkgs/data/fonts/andagii/default.nix
index 8143d284120..562aa8be4ef 100644
--- a/pkgs/data/fonts/andagii/default.nix
+++ b/pkgs/data/fonts/andagii/default.nix
@@ -1,59 +1,31 @@
-x@{builderDefsPackage
- , unzip
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchzip }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- url="http://www.i18nguy.com/unicode/andagii.zip";
- name="andagii";
- version="1.0.2";
- hash="0cknb8vin15akz4ahpyayrpqyaygp9dgrx6qw7zs7d6iv9v59ds1";
- };
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
+stdenv.mkDerivation rec {
+ name = "andagii-${version}";
+ version = "1.0.2";
+
+ src = fetchzip {
+ url = http://www.i18nguy.com/unicode/andagii.zip;
+ sha256 = "0a0c43y1fd5ksj50axhng7p00kgga0i15p136g68p35wj7kh5g2k";
+ stripRoot = false;
curlOpts = "--user-agent 'Mozilla/5.0'";
- sha256 = sourceInfo.hash;
};
- name = "${sourceInfo.name}-${sourceInfo.version}";
- inherit buildInputs;
+ phases = [ "unpackPhase" "installPhase" ];
- /* doConfigure should be removed if not needed */
- phaseNames = ["doUnpack" "doInstall"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/truetype
+ cp -v ANDAGII_.TTF $out/share/fonts/truetype/andagii.ttf
+ '';
- doUnpack = a.fullDepEntry ''
- unzip "${src}"
- '' ["addInputs"];
-
- doInstall = a.fullDepEntry (''
- mkdir -p "$out"/share/fonts/ttf/
- cp ANDAGII_.TTF "$out"/share/fonts/ttf/andagii.ttf
- '') ["defEnsureDir" "minInit"];
-
- meta = {
+ # There are multiple claims that the font is GPL, so I include the
+ # package; but I cannot find the original source, so use it on your
+ # own risk Debian claims it is GPL - good enough for me.
+ meta = with stdenv.lib; {
+ homepage = http://www.i18nguy.com/unicode/unicode-font.HTML;
description = "Unicode Plane 1 Osmanya script font";
- maintainers = with a.lib.maintainers;
- [
- raskin
- ];
- hydraPlatforms = [];
- # There are multiple claims that the font is GPL,
- # so I include the package; but I cannot find the
- # original source, so use it on your own risk
- # Debian claims it is GPL - good enough for me.
+ maintainers = with maintainers; [ raskin rycee ];
+ license = "unknown";
+ platforms = platforms.all;
};
- passthru = {
- updateInfo = {
- downloadPage = "http://www.i18nguy.com/unicode/unicode-font.html";
- };
- };
-}) x
-
+}
diff --git a/pkgs/data/fonts/anonymous-pro/default.nix b/pkgs/data/fonts/anonymous-pro/default.nix
index 5b51ee36c5c..da34a2f43aa 100644
--- a/pkgs/data/fonts/anonymous-pro/default.nix
+++ b/pkgs/data/fonts/anonymous-pro/default.nix
@@ -1,50 +1,36 @@
-x@{builderDefsPackage
- , unzip
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchurl, unzip }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- version = "1.002";
- name="anonymousPro";
- url="http://www.ms-studio.com/FontSales/AnonymousPro-${version}.zip";
+stdenv.mkDerivation rec {
+ name = "anonymousPro-${version}";
+ version = "1.002";
+
+ src = fetchurl {
+ url = "http://www.marksimonson.com/assets/content/fonts/AnonymousPro-${version}.zip";
sha256 = "1asj6lykvxh46czbal7ymy2k861zlcdqpz8x3s5bbpqwlm3mhrl6";
};
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
- sha256 = sourceInfo.sha256;
- };
- name = "${sourceInfo.name}-${sourceInfo.version}";
- inherit buildInputs;
+ nativeBuildInputs = [ unzip ];
+ phases = [ "unpackPhase" "installPhase" ];
- phaseNames = ["doUnpack" "installFonts"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/truetype
+ mkdir -p $out/share/doc/${name}
+ find . -name "*.ttf" -exec cp -v {} $out/share/fonts/truetype \;
+ find . -name "*.txt" -exec cp -v {} $out/share/doc/${name} \;
+ '';
- doUnpack = a.fullDepEntry (''
- unzip ${src}
- cd AnonymousPro*/
- '') ["addInputs"];
-
- meta = {
+ meta = with stdenv.lib; {
+ homepage = http://www.marksimonson.com/fonts/view/anonymous-pro;
description = "TrueType font set intended for source code";
- maintainers = with a.lib.maintainers;
- [
- raskin
- ];
- platforms = with a.lib.platforms;
- all;
- license = with a.lib.licenses; ofl;
- hydraPlatforms = [];
- homepage = "http://www.marksimonson.com/fonts/view/anonymous-pro";
- downloadPage = "http://www.ms-studio.com/FontSales/anonymouspro.html";
- inherit (sourceInfo) version;
+ longDescription = ''
+ Anonymous Pro (2009) is a family of four fixed-width fonts
+ designed with coding in mind. Anonymous Pro features an
+ international, Unicode-based character set, with support for
+ most Western and Central European Latin-based languages, plus
+ Greek and Cyrillic. It is designed by Mark Simonson.
+ '';
+ maintainers = with maintainers; [ raskin rycee ];
+ license = licenses.ofl;
+ platforms = platforms.all;
};
-}) x
-
+}
diff --git a/pkgs/data/fonts/cm-unicode/default.nix b/pkgs/data/fonts/cm-unicode/default.nix
index d8f6f7f8351..ed7ce93e189 100644
--- a/pkgs/data/fonts/cm-unicode/default.nix
+++ b/pkgs/data/fonts/cm-unicode/default.nix
@@ -1,40 +1,28 @@
-x@{builderDefsPackage
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchurl }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- version = "0.7.0";
- baseName="cm-unicode";
- name="${baseName}-${version}";
- url="mirror://sourceforge/${baseName}/${baseName}/${version}/${name}-otf.tar.xz";
- };
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
+stdenv.mkDerivation rec {
+ name = "cm-unicode-${version}";
+ version = "0.7.0";
+
+ src = fetchurl {
+ url = "mirror://sourceforge/cm-unicode/cm-unicode/${version}/${name}-otf.tar.xz";
sha256 = "0a0w9qm9g8qz2xh3lr61bj1ymqslqsvk4w2ybc3v2qa89nz7x2jl";
};
- inherit (sourceInfo) name version;
- inherit buildInputs;
+ phases = [ "unpackPhase" "installPhase" ];
- phaseNames = ["doUnpack" "installFonts"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/opentype
+ mkdir -p $out/share/doc/${name}
+ cp -v *.otf $out/share/fonts/opentype/
+ cp -v README FontLog.txt $out/share/doc/${name}
+ '';
- meta = {
- maintainers = with a.lib.maintainers;
- [
- raskin
- ];
- platforms = with a.lib.platforms;
- all;
- downloadPage = "http://sourceforge.net/projects/cm-unicode/files/cm-unicode/";
- inherit version;
+ meta = with stdenv.lib; {
+ homepage = http://canopus.iacp.dvo.ru/~panov/cm-unicode/;
+ description = "Computer Modern Unicode fonts";
+ maintainers = with maintainers; [ raskin rycee ];
+ license = licenses.ofl;
+ platforms = platforms.all;
};
-}) x
-
+}
diff --git a/pkgs/data/fonts/dina/default.nix b/pkgs/data/fonts/dina/default.nix
index e79dcd014d3..be420df4886 100644
--- a/pkgs/data/fonts/dina/default.nix
+++ b/pkgs/data/fonts/dina/default.nix
@@ -56,6 +56,6 @@ stdenv.mkDerivation rec {
downloadPage = https://www.donationcoder.com/Software/Jibz/Dina/;
license = licenses.free;
maintainers = [ maintainers.prikhi ];
- platforms = platforms.linux;
+ platforms = platforms.unix;
};
}
diff --git a/pkgs/data/fonts/eb-garamond/default.nix b/pkgs/data/fonts/eb-garamond/default.nix
index 99c9b53217e..0956250e36c 100644
--- a/pkgs/data/fonts/eb-garamond/default.nix
+++ b/pkgs/data/fonts/eb-garamond/default.nix
@@ -1,50 +1,28 @@
-x@{builderDefsPackage
- , unzip
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchzip }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- version="0.016";
- name="EBGaramond";
- url="https://bitbucket.org/georgd/eb-garamond/downloads/${name}-${version}.zip";
- hash="0y630khn5zh70al3mm84fs767ac94ffyz1w70zzhrhambx07pdx0";
- };
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
- sha256 = sourceInfo.hash;
+stdenv.mkDerivation rec {
+ name = "eb-garamond-${version}";
+ version = "0.016";
+
+ src = fetchzip {
+ url = "https://bitbucket.org/georgd/eb-garamond/downloads/EBGaramond-${version}.zip";
+ sha256 = "0j40bg1di39q7zis64il67xchldyznrl8wij9il10c4wr8nl4r9z";
};
- name = "eb-garamond-${sourceInfo.version}";
- inherit buildInputs;
+ phases = [ "unpackPhase" "installPhase" ];
- phaseNames = ["doUnpack" "installFonts"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/opentype
+ mkdir -p $out/share/doc/${name}
+ cp -v "otf/"*.otf $out/share/fonts/opentype/
+ cp -v Changes README.markdown README.xelualatex $out/share/doc/${name}
+ '';
- # This will clean up if/when 8263996 lands.
- doUnpack = a.fullDepEntry (''
- unzip ${src}
- cd ${sourceInfo.name}*
- mv {ttf,otf}/* .
- '') ["addInputs"];
-
- meta = with a.lib; {
- description = "Digitization of the Garamond shown on the Egenolff-Berner specimen";
- maintainers = with maintainers; [ relrod ];
- platforms = platforms.all;
- license = licenses.ofl;
+ meta = with stdenv.lib; {
homepage = http://www.georgduffner.at/ebgaramond/;
+ description = "Digitization of the Garamond shown on the Egenolff-Berner specimen";
+ maintainers = with maintainers; [ relrod rycee ];
+ license = licenses.ofl;
+ platforms = platforms.all;
};
- passthru = {
- updateInfo = {
- downloadPage = "https://github.com/georgd/EB-Garamond/releases";
- };
- };
-}) x
-
+}
diff --git a/pkgs/data/fonts/fira-mono/default.nix b/pkgs/data/fonts/fira-mono/default.nix
index 92d6b1e25b5..a01f2a62424 100644
--- a/pkgs/data/fonts/fira-mono/default.nix
+++ b/pkgs/data/fonts/fira-mono/default.nix
@@ -1,16 +1,16 @@
{ stdenv, fetchurl, unzip }:
stdenv.mkDerivation rec {
- name = "fira-mono-3.2";
+ name = "fira-mono-3.203";
src = fetchurl {
- url = http://www.carrois.com/downloads/fira_mono_3_2/FiraMonoFonts3200.zip;
- sha256 = "0g3i54q8czf3vylgasj62w2n7l1a2yrbyibjlx1qk3awh7fr1r7p";
+ url = http://www.carrois.com/downloads/fira_mono_3_2/FiraMonoFonts3203.zip;
+ sha256 = "0qaplpmsqys42a49x8d15ca2gqw1v6a6k2d56ja1j38dmr2qmpv4";
};
buildInputs = [ unzip ];
phases = [ "unpackPhase" "installPhase" ];
- sourceRoot = "FiraMonoFonts3200";
+ sourceRoot = "FiraMonoFonts3203";
installPhase = ''
mkdir -p $out/share/fonts/opentype
diff --git a/pkgs/data/fonts/fira/default.nix b/pkgs/data/fonts/fira/default.nix
index 151c945ee9e..6646fcb86b1 100644
--- a/pkgs/data/fonts/fira/default.nix
+++ b/pkgs/data/fonts/fira/default.nix
@@ -1,16 +1,16 @@
{ stdenv, fetchurl, unzip }:
stdenv.mkDerivation rec {
- name = "fira-4.1";
+ name = "fira-4.103";
src = fetchurl {
- url = "http://www.carrois.com/downloads/fira_4_1/FiraFonts4100.zip";
- sha256 = "0mqmmq1m2p0hb0x4mr74gghqr75iglilah7psfb3vdc80fc9h6yk";
+ url = http://www.carrois.com/downloads/fira_4_1/FiraFonts4103.zip;
+ sha256 = "1nw5icg3134qq2qfspvj2kclsv3965szby2lfcr65imf7lj4k52z";
};
buildInputs = [unzip];
phases = [ "unpackPhase" "installPhase" ];
- sourceRoot = "FiraFonts4100";
+ sourceRoot = "FiraFonts4103";
installPhase = ''
mkdir -p $out/share/fonts/opentype
diff --git a/pkgs/data/fonts/gentium/default.nix b/pkgs/data/fonts/gentium/default.nix
index a4e8099db96..d0af6ce0eb0 100644
--- a/pkgs/data/fonts/gentium/default.nix
+++ b/pkgs/data/fonts/gentium/default.nix
@@ -1,46 +1,29 @@
-x@{builderDefsPackage
- , unzip
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchzip }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- version="1.504";
- baseName="GentiumPlus";
- name="${baseName}-${version}";
- url="http://scripts.sil.org/cms/scripts/render_download.php?&format=file&media_id=${name}.zip&filename=${name}";
- hash="04kslaqbscpfrc6igkifcv1nkrclrm35hqpapjhw9102wpq12fpr";
- };
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
- sha256 = sourceInfo.hash;
- name = "${sourceInfo.name}.zip";
+stdenv.mkDerivation rec {
+ name = "gentium-${version}";
+ version = "1.504";
+
+ src = fetchzip {
+ name = "${name}.zip";
+ url = "http://scripts.sil.org/cms/scripts/render_download.php?format=file&media_id=GentiumPlus-${version}.zip&filename=${name}.zip";
+ sha256 = "1xdx80dfal0b8rkrp1janybx2hki7algnvkx4hyghgikpjcjkdh7";
};
- inherit (sourceInfo) name version;
- inherit buildInputs;
+ phases = [ "unpackPhase" "installPhase" ];
- phaseNames = ["addInputs" "doUnpack" "installFonts"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/truetype
+ mkdir -p $out/share/doc/${name}
+ cp -v *.ttf $out/share/fonts/truetype/
+ cp -v FONTLOG.txt GENTIUM-FAQ.txt README.txt $out/share/doc/${name}
+ '';
- meta = {
- maintainers = with a.lib.maintainers;
- [
- raskin
- ];
- platforms = with a.lib.platforms;
- all;
+ meta = with stdenv.lib; {
+ homepage = "http://scripts.sil.org/cms/scripts/page.php?site_id=nrsi&item_id=Gentium";
+ description = "A high-quality typeface family for Latin, Cyrillic, and Greek";
+ maintainers = with maintainers; [ raskin rycee ];
+ license = licenses.ofl;
+ platforms = platforms.all;
};
- passthru = {
- updateInfo = {
- downloadPage = "http://scripts.sil.org/cms/scripts/page.php?item_id=Gentium_download";
- };
- };
-}) x
-
+}
diff --git a/pkgs/data/fonts/inconsolata/default.nix b/pkgs/data/fonts/inconsolata/default.nix
index 887f37c241b..caa67256a1f 100644
--- a/pkgs/data/fonts/inconsolata/default.nix
+++ b/pkgs/data/fonts/inconsolata/default.nix
@@ -1,51 +1,26 @@
-x@{builderDefsPackage
- , fontforge
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchurl }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- name="inconsolata";
- url="http://www.levien.com/type/myfonts/Inconsolata.sfd";
- hash="1cd29c8396adb18bfeddb1abf5bdb98b677649bb9b09f126d1335b123a4cfddb";
- };
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
- sha256 = sourceInfo.hash;
+stdenv.mkDerivation rec {
+ name = "inconsolata-${version}";
+ version = "1.010";
+
+ src = fetchurl {
+ url = "http://www.levien.com/type/myfonts/Inconsolata.otf";
+ sha256 = "06js6znbcf7swn8y3b8ki416bz96ay7d3yvddqnvi88lqhbfcq8m";
};
- inherit (sourceInfo) name;
- inherit buildInputs;
+ phases = [ "installPhase" ];
- /* doConfigure should be removed if not needed */
- phaseNames = ["copySrc" "generateFontsFromSFD" "installFonts"];
-
- copySrc = a.fullDepEntry (''
- cp ${src} inconsolata.sfd
- '') ["minInit"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/opentype
+ cp -v $src $out/share/fonts/opentype/inconsolata.otf
+ '';
- generateFontsFromSFD = a.generateFontsFromSFD // {deps=["addInputs"];};
-
- meta = {
+ meta = with stdenv.lib; {
+ homepage = http://www.levien.com/type/myfonts/inconsolata.html;
description = "A monospace font for both screen and print";
- maintainers = with a.lib.maintainers;
- [
- raskin
- ];
- platforms = with a.lib.platforms;
- all;
+ maintainers = with maintainers; [ raskin rycee ];
+ license = licenses.ofl;
+ platforms = platforms.all;
};
- passthru = {
- updateInfo = {
- downloadPage = "http://www.levien.com/type/myfonts/inconsolata.html";
- };
- };
-}) x
-
+}
diff --git a/pkgs/data/fonts/oldstandard/default.nix b/pkgs/data/fonts/oldstandard/default.nix
index ad25ac7fd95..125a4b636a9 100644
--- a/pkgs/data/fonts/oldstandard/default.nix
+++ b/pkgs/data/fonts/oldstandard/default.nix
@@ -1,50 +1,29 @@
-x@{builderDefsPackage
- , unzip
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchzip }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- version="2.2";
- baseName="oldstandard";
- name="${baseName}-${version}";
- url="http://www.thessalonica.org.ru/downloads/${name}.otf.zip";
- hash="0xhbksrh9mv1cs6dl2mc8l6sypialy9wirkjr54nf7s9bcynv1h6";
- };
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
- sha256 = sourceInfo.hash;
+stdenv.mkDerivation rec {
+ name = "oldstandard-${version}";
+ version = "2.2";
+
+ src = fetchzip {
+ stripRoot = false;
+ url = "https://github.com/akryukov/oldstand/releases/download/v${version}/${name}.otf.zip";
+ sha256 = "1hl78jw5szdjq9dhbcv2ln75wpp2lzcxrnfc36z35v5wk4l7jc3h";
};
- inherit (sourceInfo) name version;
- inherit buildInputs;
+ phases = [ "unpackPhase" "installPhase" ];
- phaseNames = ["doUnpack" "installFonts"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/opentype
+ mkdir -p $out/share/doc/${name}
+ cp -v *.otf $out/share/fonts/opentype/
+ cp -v FONTLOG.txt $out/share/doc/${name}
+ '';
- doUnpack = a.fullDepEntry ''
- unzip ${src}
- '' ["addInputs"];
-
- meta = {
- description = "An old-style font";
- maintainers = with a.lib.maintainers;
- [
- raskin
- ];
- platforms = with a.lib.platforms;
- all;
+ meta = with stdenv.lib; {
+ homepage = https://github.com/akryukov/oldstand;
+ description = "An attempt to revive a specific type of Modern style of serif typefaces";
+ maintainers = with maintainers; [ raskin rycee ];
+ license = licenses.ofl;
+ platforms = platforms.all;
};
- passthru = {
- updateInfo = {
- downloadPage = "http://www.thessalonica.org.ru/ru/fonts-download.html";
- };
- };
-}) x
-
+}
diff --git a/pkgs/data/fonts/tewi/default.nix b/pkgs/data/fonts/tewi/default.nix
new file mode 100644
index 00000000000..dfcc0578f00
--- /dev/null
+++ b/pkgs/data/fonts/tewi/default.nix
@@ -0,0 +1,47 @@
+{stdenv, fetchgit, bdftopcf, mkfontdir, mkfontscale}:
+
+stdenv.mkDerivation rec {
+ date = "2015-06-07";
+ name = "tewi-font-${date}";
+
+ src = fetchgit {
+ url = "https://github.com/lucy/tewi-font";
+ rev = "ff930e66ae471da4fdc226ffe65fd1ccd13d4a69";
+ sha256 = "d641b911cc2132a00c311e3d978c1ca454b0fb3bc3ff4b4742b9f765b765a94b";
+ };
+
+ buildInputs = [ bdftopcf mkfontdir mkfontscale ];
+ buildPhase = ''
+ for i in *.bdf; do
+ bdftopcf -o ''${i/bdf/pcf} $i
+ done
+
+ gzip *.pcf
+ '';
+
+ installPhase = ''
+ fontDir="$out/share/fonts/misc"
+ mkdir -p "$fontDir"
+ mv *.pcf.gz "$fontDir"
+
+ cd "$fontDir"
+ mkfontdir
+ mkfontscale
+ '';
+
+ meta = with stdenv.lib; {
+ description = "A nice bitmap font, readable even at small sizes";
+ longDescription = ''
+ Tewi is a bitmap font, readable even at very small font sizes. This is
+ particularily useful while programming, to fit a lot of code on your
+ screen.
+ '';
+ homepage = "https://github.com/lucy/tewi-font";
+ license = {
+ fullName = "GNU General Public License with a font exception";
+ url = "https://www.gnu.org/licenses/gpl-faq.html#FontException";
+ };
+ maintainers = [ maintainers.fro_ozen ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/pkgs/data/fonts/theano/default.nix b/pkgs/data/fonts/theano/default.nix
index ca560c72a8e..c385c3d40a9 100644
--- a/pkgs/data/fonts/theano/default.nix
+++ b/pkgs/data/fonts/theano/default.nix
@@ -1,50 +1,29 @@
-x@{builderDefsPackage
- , unzip
- , ...}:
-builderDefsPackage
-(a :
-let
- helperArgNames = ["stdenv" "fetchurl" "builderDefsPackage"] ++
- [];
+{ stdenv, fetchzip }:
- buildInputs = map (n: builtins.getAttr n x)
- (builtins.attrNames (builtins.removeAttrs x helperArgNames));
- sourceInfo = rec {
- version="2.0";
- baseName="theano";
- name="${baseName}-${version}";
- url="http://www.thessalonica.org.ru/downloads/${name}.otf.zip";
- hash="1xiykqbbiawvfk33639awmgdn25b8s2k7vpwncl17bzlk887b4z6";
- };
-in
-rec {
- src = a.fetchurl {
- url = sourceInfo.url;
- sha256 = sourceInfo.hash;
+stdenv.mkDerivation rec {
+ name = "theano-${version}";
+ version = "2.0";
+
+ src = fetchzip {
+ stripRoot = false;
+ url = "https://github.com/akryukov/theano/releases/download/v${version}/theano-${version}.otf.zip";
+ sha256 = "1z3c63rcp4vfjyfv8xwc3br10ydwjyac3ipbl09y01s7qhfz02gp";
};
- inherit (sourceInfo) name version;
- inherit buildInputs;
+ phases = [ "unpackPhase" "installPhase" ];
- phaseNames = ["doUnpack" "installFonts"];
+ installPhase = ''
+ mkdir -p $out/share/fonts/opentype
+ mkdir -p $out/share/doc/${name}
+ find . -name "*.otf" -exec cp -v {} $out/share/fonts/opentype \;
+ find . -name "*.txt" -exec cp -v {} $out/share/doc/${name} \;
+ '';
- doUnpack = a.fullDepEntry ''
- unzip ${src}
- '' ["addInputs"];
-
- meta = {
- description = "An old-style font";
- maintainers = with a.lib.maintainers;
- [
- raskin
- ];
- platforms = with a.lib.platforms;
- all;
+ meta = with stdenv.lib; {
+ homepage = https://github.com/akryukov/theano;
+ description = "An old-style font designed from historic samples";
+ maintainers = with maintainers; [ raskin rycee ];
+ license = licenses.ofl;
+ platforms = platforms.all;
};
- passthru = {
- updateInfo = {
- downloadPage = "http://www.thessalonica.org.ru/ru/fonts-download.html";
- };
- };
-}) x
-
+}
diff --git a/pkgs/data/misc/cacert/default.nix b/pkgs/data/misc/cacert/default.nix
index d743fc47b94..7bcb499aab4 100644
--- a/pkgs/data/misc/cacert/default.nix
+++ b/pkgs/data/misc/cacert/default.nix
@@ -16,8 +16,8 @@ stdenv.mkDerivation rec {
'';
installPhase = ''
- mkdir -pv $out
- cp -v ca-bundle.crt $out
+ mkdir -pv $out/etc/ssl/certs
+ cp -v ca-bundle.crt $out/etc/ssl/certs
'';
meta = with stdenv.lib; {
diff --git a/pkgs/data/misc/geolite-legacy/default.nix b/pkgs/data/misc/geolite-legacy/default.nix
index a34c10630aa..b6cc2a25266 100644
--- a/pkgs/data/misc/geolite-legacy/default.nix
+++ b/pkgs/data/misc/geolite-legacy/default.nix
@@ -8,7 +8,7 @@ let
# Annoyingly, these files are updated without a change in URL. This means that
# builds will start failing every month or so, until the hashes are updated.
- version = "2015-06-03";
+ version = "2015-06-15";
in
stdenv.mkDerivation {
name = "geolite-legacy-${version}";
@@ -22,7 +22,7 @@ stdenv.mkDerivation {
srcGeoLiteCityv6 = fetchDB "GeoLiteCityv6-beta/GeoLiteCityv6.dat.gz"
"0xjzg76vdsayxyy1yyw64w781vad4c9nbhw61slh2qmazdr360g9";
srcGeoIPASNum = fetchDB "asnum/GeoIPASNum.dat.gz"
- "0zccfd1wsny3n1f3wgkb071pp6z01nmk0p6nngha0gwnywchvbx4";
+ "18kxswr0b5klimfpj1zhxipvyvrljvcywic4jc1ggcr44lf4hj9w";
srcGeoIPASNumv6 = fetchDB "asnum/GeoIPASNumv6.dat.gz"
"0asnmmirridiy57zm0kccb7g8h7ndliswfv3yfk7zm7dk98njnxs";
diff --git a/pkgs/data/misc/nixos-artwork/default.nix b/pkgs/data/misc/nixos-artwork/default.nix
new file mode 100644
index 00000000000..b35a96fff82
--- /dev/null
+++ b/pkgs/data/misc/nixos-artwork/default.nix
@@ -0,0 +1,23 @@
+{ stdenv, fetchurl }:
+
+stdenv.mkDerivation {
+ name = "nixos-artwork-2015-02-27";
+ # Remember to check the default lightdm wallpaper when updating
+
+ GnomeDark = fetchurl {
+ url = https://raw.githubusercontent.com/NixOS/nixos-artwork/7ece5356398db14b5513392be4b31f8aedbb85a2/gnome/Gnome_Dark.png;
+ sha256 = "0c7sl9k4zdjwvdz3nhlm8i4qv4cjr0qagalaa1a438jigixx27l7";
+ };
+
+ unpackPhase = "true";
+
+ installPhase = ''
+ mkdir -p $out/share/artwork/gnome
+ ln -s $GnomeDark $out/share/artwork/gnome/Gnome_Dark.png
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = https://github.com/NixOS/nixos-artwork;
+ platforms = platforms.all;
+ };
+}
diff --git a/pkgs/data/misc/tzdata/default.nix b/pkgs/data/misc/tzdata/default.nix
index 0ed99bfdb16..6d10fe68a09 100644
--- a/pkgs/data/misc/tzdata/default.nix
+++ b/pkgs/data/misc/tzdata/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl }:
-let version = "2015d"; in
+let version = "2015e"; in
stdenv.mkDerivation rec {
name = "tzdata-${version}";
@@ -8,11 +8,11 @@ stdenv.mkDerivation rec {
srcs =
[ (fetchurl {
url = "http://www.iana.org/time-zones/repository/releases/tzdata${version}.tar.gz";
- sha256 = "0cfmjvr753b3wjnr1njv268xcs31yl9pifkxx58y42bz4w4517wb";
+ sha256 = "0vxs6j1i429vxz4a1lbwjz81k236lxdggqvrlix2ga5xib9vbjgz";
})
(fetchurl {
url = "http://www.iana.org/time-zones/repository/releases/tzcode${version}.tar.gz";
- sha256 = "0a3i65b6lracfx18s8j69k0x30x8aq9gx7qm040sybn4qm7ga6i2";
+ sha256 = "185db6789kygcpcl48y1dh6m4fkgqcwqjwx7f3s5dys7b2sig8mm";
})
];
diff --git a/pkgs/desktops/gnome-2/platform/gtkglextmm/default.nix b/pkgs/desktops/gnome-2/platform/gtkglextmm/default.nix
index bf09bd93eeb..97bad111ca7 100644
--- a/pkgs/desktops/gnome-2/platform/gtkglextmm/default.nix
+++ b/pkgs/desktops/gnome-2/platform/gtkglextmm/default.nix
@@ -1,4 +1,6 @@
-{ stdenv, fetchurl, pkgconfig, gtkglext, gtkmm, gtk, mesa, gdk_pixbuf }:
+{ stdenv, fetchurl, pkgconfig, gtkglext, gtkmm, gtk, mesa, gdk_pixbuf
+, pangox_compat, libXmu
+}:
stdenv.mkDerivation rec {
name = "gtkglextmm-${minVer}.0";
@@ -9,7 +11,16 @@ stdenv.mkDerivation rec {
sha256 = "6cd4bd2a240e5eb1e3a24c5a3ebbf7ed905b522b888439778043fdeb58771fea";
};
- patches = [ ./gdk.patch ];
+ patches = [
+ ./gdk.patch
+
+ # From debian, fixes build with newer gtk "[...] by switching #includes
+ # around so that the G_DISABLE_DEPRECATED trick in glibmm still works".
+ # https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=707356
+ ./fix_ftbfs_gtk_2_36.patch
+ ];
+
+ buildInputs = [ pangox_compat libXmu ];
nativeBuildInputs = [pkgconfig];
diff --git a/pkgs/desktops/gnome-2/platform/gtkglextmm/fix_ftbfs_gtk_2_36.patch b/pkgs/desktops/gnome-2/platform/gtkglextmm/fix_ftbfs_gtk_2_36.patch
new file mode 100644
index 00000000000..88e271e3eb7
--- /dev/null
+++ b/pkgs/desktops/gnome-2/platform/gtkglextmm/fix_ftbfs_gtk_2_36.patch
@@ -0,0 +1,121 @@
+Index: gtkglextmm-1.2.0/gdkglext/gdkmm/gl/wrap_init.cc
+===================================================================
+--- gtkglextmm-1.2.0.orig/gdkglext/gdkmm/gl/wrap_init.cc 2013-05-16 23:40:48.363207736 +0200
++++ gtkglextmm-1.2.0/gdkglext/gdkmm/gl/wrap_init.cc 2013-05-16 23:42:40.193801834 +0200
+@@ -1,15 +1,8 @@
+-
+-#include
+-
+ // Disable the 'const' function attribute of the get_type() functions.
+ // GCC would optimize them out because we don't use the return value.
+ #undef G_GNUC_CONST
+ #define G_GNUC_CONST /* empty */
+
+-#include
+-#include
+-#include
+-
+ // #include the widget headers so that we can call the get_type() static methods:
+
+ #include "tokens.h"
+@@ -19,6 +12,12 @@
+ #include "pixmap.h"
+ #include "window.h"
+
++#include
++
++#include
++#include
++#include
++
+ extern "C"
+ {
+
+Index: gtkglextmm-1.2.0/gdkglext/gdkmm/gl/query.cc
+===================================================================
+--- gtkglextmm-1.2.0.orig/gdkglext/gdkmm/gl/query.cc 2013-05-16 23:40:48.363207736 +0200
++++ gtkglextmm-1.2.0/gdkglext/gdkmm/gl/query.cc 2013-05-16 23:42:40.193801834 +0200
+@@ -17,10 +17,10 @@
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
+ */
+
+-#include
+-
+ #include "query.h"
+
++#include
++
+ namespace Gdk
+ {
+ namespace GL
+Index: gtkglextmm-1.2.0/gdkglext/gdkmm/gl/pixmapext.cc
+===================================================================
+--- gtkglextmm-1.2.0.orig/gdkglext/gdkmm/gl/pixmapext.cc 2013-05-16 23:40:48.363207736 +0200
++++ gtkglextmm-1.2.0/gdkglext/gdkmm/gl/pixmapext.cc 2013-05-16 23:42:40.193801834 +0200
+@@ -17,11 +17,11 @@
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
+ */
+
++#include "pixmapext.h"
++
+ #include
+ #include
+
+-#include "pixmapext.h"
+-
+ namespace Gdk
+ {
+ namespace GL
+Index: gtkglextmm-1.2.0/gdkglext/gdkmm/gl/windowext.cc
+===================================================================
+--- gtkglextmm-1.2.0.orig/gdkglext/gdkmm/gl/windowext.cc 2013-05-16 23:40:48.363207736 +0200
++++ gtkglextmm-1.2.0/gdkglext/gdkmm/gl/windowext.cc 2013-05-16 23:42:40.193801834 +0200
+@@ -17,11 +17,11 @@
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
+ */
+
++#include "windowext.h"
++
+ #include
+ #include
+
+-#include "windowext.h"
+-
+ namespace Gdk
+ {
+ namespace GL
+Index: gtkglextmm-1.2.0/gdkglext/gdkmm/gl/font.cc
+===================================================================
+--- gtkglextmm-1.2.0.orig/gdkglext/gdkmm/gl/font.cc 2004-05-18 08:01:49.000000000 +0200
++++ gtkglextmm-1.2.0/gdkglext/gdkmm/gl/font.cc 2013-05-16 23:43:07.637456821 +0200
+@@ -17,10 +17,10 @@
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
+ */
+
+-#include
+-
+ #include "font.h"
+
++#include
++
+ namespace Gdk
+ {
+ namespace GL
+Index: gtkglextmm-1.2.0/gdkglext/gdkmm/gl/init.cc
+===================================================================
+--- gtkglextmm-1.2.0.orig/gdkglext/gdkmm/gl/init.cc 2003-02-27 10:49:24.000000000 +0100
++++ gtkglextmm-1.2.0/gdkglext/gdkmm/gl/init.cc 2013-05-16 23:44:38.320316782 +0200
+@@ -19,11 +19,11 @@
+
+ #include
+
+-#include
+-
+ #include "wrap_init.h"
+ #include "init.h"
+
++#include
++
+ namespace Gdk
+ {
+ namespace GL
diff --git a/pkgs/desktops/gnome-3/3.16/apps/evolution/default.nix b/pkgs/desktops/gnome-3/3.16/apps/evolution/default.nix
index af60d890673..b4240a35a68 100644
--- a/pkgs/desktops/gnome-3/3.16/apps/evolution/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/apps/evolution/default.nix
@@ -7,11 +7,11 @@
let
majVer = gnome3.version;
in stdenv.mkDerivation rec {
- name = "evolution-${majVer}.1";
+ name = "evolution-${majVer}.3";
src = fetchurl {
url = "mirror://gnome/sources/evolution/${majVer}/${name}.tar.xz";
- sha256 = "1lm877rrcfy98mpp4iq7m9p8r1nr9kir916n4qin2ygas9zx0qlb";
+ sha256 = "1mh769adz40r22x0jw5z4carkcbhx36qy2j8kl2djjbp1jf5vhnd";
};
doCheck = true;
diff --git a/pkgs/desktops/gnome-3/3.16/apps/pomodoro/default.nix b/pkgs/desktops/gnome-3/3.16/apps/pomodoro/default.nix
index bce514364ce..650d978277b 100644
--- a/pkgs/desktops/gnome-3/3.16/apps/pomodoro/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/apps/pomodoro/default.nix
@@ -1,34 +1,33 @@
{ stdenv, fetchFromGitHub, which, automake113x, intltool, pkgconfig, libtool, makeWrapper,
- dbus_glib, libcanberra, gst_all_1, upower, vala, gnome3, gtk3, gst_plugins_base,
- glib, gobjectIntrospection, hicolor_icon_theme
+ dbus_glib, libcanberra, gst_all_1, vala, gnome3, gtk3, gst_plugins_base,
+ glib, gobjectIntrospection, hicolor_icon_theme, telepathy_glib
}:
stdenv.mkDerivation rec {
- rev = "0.10.3";
- name = "gnome-shell-pomodoro-${rev}-61df3fa";
+ rev = "624945d";
+ name = "gnome-shell-pomodoro-${gnome3.version}-${rev}";
src = fetchFromGitHub {
owner = "codito";
- repo = "gnome-shell-pomodoro";
+ repo = "gnome-pomodoro";
rev = "${rev}";
- sha256 = "0i0glmijalppb5hdb1xd6xnmv824l2w831rpkqmhxi0iqbvaship";
+ sha256 = "0vjy95zvd309n8g13fa80qhqlv7k6wswhrjw7gddxrnmr662xdqq";
};
configureScript = ''./autogen.sh'';
buildInputs = [
which automake113x intltool glib gobjectIntrospection pkgconfig libtool
- makeWrapper dbus_glib libcanberra upower vala gst_all_1.gstreamer
+ makeWrapper dbus_glib libcanberra vala gst_all_1.gstreamer
gst_all_1.gst-plugins-base gst_all_1.gst-plugins-good
gnome3.gsettings_desktop_schemas gnome3.gnome_desktop
gnome3.gnome_common gnome3.gnome_shell hicolor_icon_theme gtk3
+ telepathy_glib
];
preBuild = ''
- sed -i \
- -e 's|/usr\(/share/gir-1.0/UPowerGlib\)|${upower}\1|' \
- -e 's|/usr\(/share/gir-1.0/GnomeDesktop\)|${gnome3.gnome_desktop}\1|' \
- vapi/Makefile
+ sed -i 's|\$(INTROSPECTION_GIRDIR)|${gnome3.gnome_desktop}/share/gir-1.0|' \
+ vapi/Makefile
'';
preFixup = ''
@@ -39,10 +38,12 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
homepage = https://github.com/codito/gnome-shell-pomodoro;
- description =
- "Personal information management application that provides integrated " +
- "mail, calendaring and address book functionality";
- maintainers = with maintainers; [ DamienCassou ];
+ description = "A time management utility for GNOME based on the pomodoro technique";
+ longDescription = ''
+ This GNOME utility helps to manage time according to Pomodoro Technique.
+ It intends to improve productivity and focus by taking short breaks.
+ '';
+ maintainers = with maintainers; [ DamienCassou jgeerds ];
license = licenses.gpl3;
platforms = platforms.linux;
};
diff --git a/pkgs/desktops/gnome-3/3.16/core/dconf-editor/default.nix b/pkgs/desktops/gnome-3/3.16/core/dconf-editor/default.nix
index 06c01d305f8..e69bcd39032 100644
--- a/pkgs/desktops/gnome-3/3.16/core/dconf-editor/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/core/dconf-editor/default.nix
@@ -13,12 +13,12 @@ stdenv.mkDerivation rec {
sha256 = "0vl5ygbh8blbk3710w34lmhxxl4g275vzpyhjsq0016c597isp88";
};
- buildInputs = [ vala libxslt pkgconfig glib dbus_glib gnome3.gtk libxml2
+ buildInputs = [ vala libxslt pkgconfig glib dbus_glib gnome3.gtk libxml2 gnome3.defaultIconTheme
intltool docbook_xsl docbook_xsl_ns makeWrapper gnome3.dconf ];
preFixup = ''
wrapProgram "$out/bin/dconf-editor" \
- --prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH"
+ --prefix XDG_DATA_DIRS : "$XDG_ICON_DIRS:$GSETTINGS_SCHEMAS_PATH"
'';
meta = with stdenv.lib; {
diff --git a/pkgs/desktops/gnome-3/3.16/core/evolution-data-server/default.nix b/pkgs/desktops/gnome-3/3.16/core/evolution-data-server/default.nix
index 7193b845468..82397b385d5 100644
--- a/pkgs/desktops/gnome-3/3.16/core/evolution-data-server/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/core/evolution-data-server/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
- name = "evolution-data-server-${gnome3.version}.1";
+ name = "evolution-data-server-${gnome3.version}.3";
src = fetchurl {
url = "mirror://gnome/sources/evolution-data-server/${gnome3.version}/${name}.tar.xz";
- sha256 = "0lgb8jvn8kx50692gg1m9klvwm7msvk4f7wm0yl7rj880wbxzvh4";
+ sha256 = "19dcvhlqh25pkkd29hhm9yik8xxfy01hcakikrai0x1a04aa2s7f";
};
buildInputs = with gnome3;
diff --git a/pkgs/desktops/gnome-3/3.16/core/gcr/default.nix b/pkgs/desktops/gnome-3/3.16/core/gcr/default.nix
index b3acdee072d..f9d87298fff 100644
--- a/pkgs/desktops/gnome-3/3.16/core/gcr/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/core/gcr/default.nix
@@ -11,10 +11,12 @@ stdenv.mkDerivation rec {
};
buildInputs = [
- pkgconfig intltool gnupg p11_kit glib gobjectIntrospection libxslt
+ pkgconfig intltool gnupg glib gobjectIntrospection libxslt
libgcrypt libtasn1 dbus_glib gtk pango gdk_pixbuf atk makeWrapper vala
];
+ propagatedBuildInputs = [ p11_kit ];
+
#doCheck = true;
preFixup = ''
diff --git a/pkgs/desktops/gnome-3/3.16/core/gnome-bluetooth/default.nix b/pkgs/desktops/gnome-3/3.16/core/gnome-bluetooth/default.nix
index ab8f380f672..5b7d7c19d29 100644
--- a/pkgs/desktops/gnome-3/3.16/core/gnome-bluetooth/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/core/gnome-bluetooth/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, gnome3, pkgconfig, intltool, glib
-, udev, itstool, libxml2 }:
+, udev, itstool, libxml2, makeWrapper }:
stdenv.mkDerivation rec {
name = "gnome-bluetooth-${gnome3.version}.1";
@@ -9,8 +9,13 @@ stdenv.mkDerivation rec {
sha256 = "12z0792j5ln238ajhgqx5jrm34wz2yqbbskhlp23p9c0cwnj1srz";
};
- buildInputs = with gnome3; [ pkgconfig intltool glib gtk3 udev libxml2
- gsettings_desktop_schemas itstool ];
+ buildInputs = with gnome3; [ pkgconfig intltool glib gtk3 udev libxml2 gnome3.defaultIconTheme
+ makeWrapper gsettings_desktop_schemas itstool ];
+
+ preFixup = ''
+ wrapProgram "$out/bin/bluetooth-sendto" \
+ --prefix XDG_DATA_DIRS : "$XDG_ICON_DIRS:$GSETTINGS_SCHEMAS_PATH"
+ '';
meta = with stdenv.lib; {
homepage = https://help.gnome.org/users/gnome-bluetooth/stable/index.html.en;
diff --git a/pkgs/desktops/gnome-3/3.16/core/gnome-keyring/default.nix b/pkgs/desktops/gnome-3/3.16/core/gnome-keyring/default.nix
index 7afa2800105..4ed0f6c521b 100644
--- a/pkgs/desktops/gnome-3/3.16/core/gnome-keyring/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/core/gnome-keyring/default.nix
@@ -22,7 +22,7 @@ in stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig intltool docbook_xsl_ns docbook_xsl ];
configureFlags = [
- "--with-ca-certificates=${cacert}/ca-bundle.crt" # NixOS hardcoded path
+ "--with-ca-certificates=${cacert}/etc/ssl/certs/ca-bundle.crt" # NixOS hardcoded path
"--with-pkcs11-config=$$out/etc/pkcs11/" # installation directories
"--with-pkcs11-modules=$$out/lib/pkcs11/"
];
diff --git a/pkgs/desktops/gnome-3/3.16/core/rest/default.nix b/pkgs/desktops/gnome-3/3.16/core/rest/default.nix
index 9dbd46946c0..ee22cd97f6e 100644
--- a/pkgs/desktops/gnome-3/3.16/core/rest/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/core/rest/default.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
buildInputs = [ pkgconfig glib libsoup gobjectIntrospection];
- configureFlags = "--with-ca-certificates=${cacert}/ca-bundle.crt";
+ configureFlags = "--with-ca-certificates=${cacert}/etc/ssl/certs/ca-bundle.crt";
meta = with stdenv.lib; {
platforms = platforms.linux;
diff --git a/pkgs/desktops/gnome-3/3.16/default.nix b/pkgs/desktops/gnome-3/3.16/default.nix
index 15f4a210e04..2dee0cefd92 100644
--- a/pkgs/desktops/gnome-3/3.16/default.nix
+++ b/pkgs/desktops/gnome-3/3.16/default.nix
@@ -1,6 +1,18 @@
-{ callPackage, pkgs, self }:
+{ pkgs }:
+
+let
+
+ pkgsFun = overrides:
+ let
+ self = self_ // overrides;
+ self_ = with self; {
+
+ overridePackages = f:
+ let newself = pkgsFun (f newself self);
+ in newself;
+
+ callPackage = pkgs.newScope self;
-rec {
corePackages = with gnome3; [
pkgs.desktop_file_utils pkgs.ibus
pkgs.shared_mime_info # for update-mime-database
@@ -273,14 +285,6 @@ rec {
gfbgraph = callPackage ./misc/gfbgraph { };
- goffice = callPackage ./misc/goffice { };
-
- goffice_0_8 = callPackage ./misc/goffice/0.8.nix {
- inherit (pkgs.gnome2) libglade libgnomeui;
- gconf = pkgs.gnome2.GConf;
- libart = pkgs.gnome2.libart_lgpl;
- };
-
gitg = callPackage ./misc/gitg {
webkitgtk = webkitgtk24x;
};
@@ -301,4 +305,7 @@ rec {
gtkhtml = callPackage ./misc/gtkhtml { };
-}
+ };
+ in self; # pkgsFun
+
+in pkgsFun {}
diff --git a/pkgs/desktops/plasma-5.3/default.nix b/pkgs/desktops/plasma-5.3/default.nix
index c4fb624a377..39ccb4e3c30 100644
--- a/pkgs/desktops/plasma-5.3/default.nix
+++ b/pkgs/desktops/plasma-5.3/default.nix
@@ -12,7 +12,7 @@
# make a copy of this directory first. After copying, be sure to delete ./tmp
# if it exists. Then follow the minor update instructions.
-{ autonix, kf5, pkgs, qt5, stdenv, debug ? false }:
+{ autonix, kf5, kdeApps, pkgs, qt5, stdenv, debug ? false }:
with stdenv.lib; with autonix;
@@ -143,19 +143,19 @@ let
};
plasma-workspace = with pkgs; super.plasma-workspace // {
- patches = [
- (substituteAll {
- src = ./plasma-workspace/0001-startkde-NixOS-patches.patch;
- inherit (pkgs) bash gnused gnugrep socat;
- inherit (kf5) kconfig kinit kservice;
- inherit (pkgs.xorg) mkfontdir xmessage xprop xrdb xset xsetroot;
- qt5tools = qt5.tools;
- dbus_tools = pkgs.dbus.tools;
- })
- ];
+ patches = [ ./plasma-workspace/0001-startkde-NixOS-patches.patch ];
buildInputs = with xlibs;
super.plasma-workspace.buildInputs ++ [ libSM libXcursor pam ];
+
+ inherit (pkgs) bash gnused gnugrep socat;
+ inherit (kf5) kconfig kinit kservice;
+ inherit (pkgs.xorg) mkfontdir xmessage xprop xrdb xset xsetroot;
+ kde_workspace = kdeApps.kde-workspace;
+ qt5tools = qt5.tools;
+ dbus_tools = pkgs.dbus.tools;
+
postPatch = ''
+ substituteAllInPlace startkde/startkde.cmake
substituteInPlace startkde/kstartupconfig/kstartupconfig.cpp \
--replace kdostartupconfig5 $out/bin/kdostartupconfig5
'';
diff --git a/pkgs/desktops/plasma-5.3/plasma-workspace/0001-startkde-NixOS-patches.patch b/pkgs/desktops/plasma-5.3/plasma-workspace/0001-startkde-NixOS-patches.patch
index a542fb7b87d..86c6dd857be 100644
--- a/pkgs/desktops/plasma-5.3/plasma-workspace/0001-startkde-NixOS-patches.patch
+++ b/pkgs/desktops/plasma-5.3/plasma-workspace/0001-startkde-NixOS-patches.patch
@@ -1,14 +1,14 @@
-From 37abdee4e25f6aff55da838864d1a67a7be758ad Mon Sep 17 00:00:00 2001
+From ff61c8ba856328a60e29938466b69d0bb38a357f Mon Sep 17 00:00:00 2001
From: Thomas Tuegel
Date: Tue, 2 Jun 2015 11:21:43 -0500
Subject: [PATCH] startkde: NixOS patches
---
- startkde/startkde.cmake | 214 ++++++++++++++++++++----------------------------
- 1 file changed, 87 insertions(+), 127 deletions(-)
+ startkde/startkde.cmake | 218 ++++++++++++++++++++----------------------------
+ 1 file changed, 89 insertions(+), 129 deletions(-)
diff --git a/startkde/startkde.cmake b/startkde/startkde.cmake
-index 24e5c1b..787d719 100644
+index 24e5c1b..e7bdd32 100644
--- a/startkde/startkde.cmake
+++ b/startkde/startkde.cmake
@@ -1,8 +1,31 @@
@@ -93,7 +93,7 @@ index 24e5c1b..787d719 100644
#This is basically setting defaults so we can use them with kstartupconfig5
cat >$configDir/startupconfigkeys </dev/null 2>/dev/null; then
+ : # ok
@@ -189,6 +192,13 @@ index 24e5c1b..787d719 100644
ksplash_pid=
if test -z "$dl"; then
# the splashscreen and progress indicator
+ case "$ksplashrc_ksplash_engine" in
+ KSplashQML)
+- ksplash_pid=`ksplashqml "${ksplashrc_ksplash_theme}" --pid`
++ ksplash_pid=`@out@/bin/ksplashqml "${ksplashrc_ksplash_theme}" --pid`
+ ;;
+ None)
+ ;;
@@ -205,8 +194,7 @@ fi
# For anything else (that doesn't set env vars, or that needs a window manager),
# better use the Autostart folder.
diff --git a/pkgs/development/compilers/fsharp/default.nix b/pkgs/development/compilers/fsharp/default.nix
index 82742cf9af6..92d80deb532 100644
--- a/pkgs/development/compilers/fsharp/default.nix
+++ b/pkgs/development/compilers/fsharp/default.nix
@@ -1,4 +1,6 @@
-{ stdenv, fetchurl, mono, pkgconfig, autoconf, automake, which }:
+# Temporaririly avoid dependency on dotnetbuildhelpers to avoid rebuilding many times while working on it
+
+{ stdenv, fetchurl, mono, pkgconfig, dotnetbuildhelpers, autoconf, automake, which }:
stdenv.mkDerivation rec {
name = "fsharp-${version}";
@@ -9,7 +11,7 @@ stdenv.mkDerivation rec {
sha256 = "16kqgdx0y0lmxv59mc4g7l5ll60nixg5b8bg07vxfnqrf7i6dffd";
};
- buildInputs = [ mono pkgconfig autoconf automake which ];
+ buildInputs = [ mono pkgconfig dotnetbuildhelpers autoconf automake which ];
configurePhase = ''
substituteInPlace ./autogen.sh --replace "/usr/bin/env sh" "/bin/sh"
./autogen.sh --prefix $out
@@ -23,6 +25,10 @@ stdenv.mkDerivation rec {
substituteInPlace $out/bin/fsharpiAnyCpu --replace " mono " " ${mono}/bin/mono "
ln -s $out/bin/fsharpc $out/bin/fsc
ln -s $out/bin/fsharpi $out/bin/fsi
+ for dll in "$out/lib/mono/4.5"/FSharp*.dll
+ do
+ create-pkg-config-for-dll.sh "$out/lib/pkgconfig" "$dll"
+ done
'';
# To fix this error when running:
diff --git a/pkgs/development/compilers/ghc/head.nix b/pkgs/development/compilers/ghc/head.nix
index 45bb4342088..bc59a53bc17 100644
--- a/pkgs/development/compilers/ghc/head.nix
+++ b/pkgs/development/compilers/ghc/head.nix
@@ -17,14 +17,14 @@ let
in
stdenv.mkDerivation rec {
- version = "7.11.20150402";
+ version = "7.11.20150607";
name = "ghc-${version}";
- rev = "47f821a1a24553dc29b9581b1a259a9b1394c955";
+ rev = "89223ce1340654455a9f3aa9cbf25f30884227fd";
src = fetchgit {
url = "git://git.haskell.org/ghc.git";
inherit rev;
- sha256 = "111a2z6bgn966g04a9n2ns9n2a401rd0zqgndznn2w4fv8a4qzgj";
+ sha256 = "1qsv2n5js21kqphq92xlyc91f11fnr9sh1glqzsirc8xr60dg5cs";
};
postUnpack = ''
diff --git a/pkgs/development/compilers/go/1.1-darwin.nix b/pkgs/development/compilers/go/1.1-darwin.nix
index 5b17f56ac37..776c1e04f08 100644
--- a/pkgs/development/compilers/go/1.1-darwin.nix
+++ b/pkgs/development/compilers/go/1.1-darwin.nix
@@ -69,11 +69,11 @@ stdenv.mkDerivation {
cp ./misc/emacs/* $out/share/emacs/site-lisp/
'';
- meta = {
+ meta = with stdenv.lib; {
homepage = http://golang.org/;
description = "The Go Programming language";
- license = "BSD";
- maintainers = with stdenv.lib.maintainers; [ zef ];
- platforms = stdenv.lib.platforms.darwin;
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ zef ];
+ platforms = platforms.darwin;
};
}
diff --git a/pkgs/development/compilers/go/1.1.nix b/pkgs/development/compilers/go/1.1.nix
index 11640f2393d..de34e3e3cda 100644
--- a/pkgs/development/compilers/go/1.1.nix
+++ b/pkgs/development/compilers/go/1.1.nix
@@ -90,12 +90,12 @@ stdenv.mkDerivation {
cp ./misc/emacs/* $out/share/emacs/site-lisp/
'';
- meta = {
+ meta = with stdenv.lib; {
branch = "1.1";
homepage = http://golang.org/;
description = "The Go Programming language";
- license = "BSD";
- maintainers = with stdenv.lib.maintainers; [ pierron viric ];
- platforms = stdenv.lib.platforms.linux;
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ pierron viric ];
+ platforms = platforms.linux;
};
}
diff --git a/pkgs/development/compilers/go/1.2.nix b/pkgs/development/compilers/go/1.2.nix
index 113e2118efb..bbedea812b8 100644
--- a/pkgs/development/compilers/go/1.2.nix
+++ b/pkgs/development/compilers/go/1.2.nix
@@ -81,12 +81,12 @@ stdenv.mkDerivation {
cp ./misc/emacs/* $out/share/emacs/site-lisp/
'';
- meta = {
+ meta = with stdenv.lib; {
branch = "1.2";
homepage = http://golang.org/;
description = "The Go Programming language";
- license = "BSD";
- maintainers = with stdenv.lib.maintainers; [ pierron viric ];
- platforms = stdenv.lib.platforms.linux;
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ pierron viric ];
+ platforms = platforms.linux;
};
}
diff --git a/pkgs/development/compilers/go/1.3.nix b/pkgs/development/compilers/go/1.3.nix
index 6d88049cfbe..52a388aff1f 100644
--- a/pkgs/development/compilers/go/1.3.nix
+++ b/pkgs/development/compilers/go/1.3.nix
@@ -102,12 +102,12 @@ stdenv.mkDerivation {
setupHook = ./setup-hook.sh;
- meta = {
+ meta = with stdenv.lib; {
branch = "1.3";
homepage = http://golang.org/;
description = "The Go Programming language";
- license = "BSD";
- maintainers = with stdenv.lib.maintainers; [ cstrahan ];
- platforms = stdenv.lib.platforms.linux ++ stdenv.lib.platforms.darwin;
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ cstrahan ];
+ platforms = platforms.linux ++ platforms.darwin;
};
}
diff --git a/pkgs/development/compilers/go/1.4.nix b/pkgs/development/compilers/go/1.4.nix
index 1feaf68930a..12642eeace5 100644
--- a/pkgs/development/compilers/go/1.4.nix
+++ b/pkgs/development/compilers/go/1.4.nix
@@ -88,12 +88,12 @@ stdenv.mkDerivation rec {
setupHook = ./setup-hook.sh;
- meta = {
+ meta = with stdenv.lib; {
branch = "1.4";
homepage = http://golang.org/;
description = "The Go Programming language";
- license = "BSD";
- maintainers = with stdenv.lib.maintainers; [ cstrahan wkennington ];
- platforms = stdenv.lib.platforms.linux ++ stdenv.lib.platforms.darwin;
+ license = licenses.bsd3;
+ maintainers = with maintainers; [ cstrahan wkennington ];
+ platforms = platforms.linux ++ platforms.darwin;
};
}
diff --git a/pkgs/development/compilers/icedtea/cppflags-include-fix.patch b/pkgs/development/compilers/icedtea/cppflags-include-fix.patch
deleted file mode 100644
index 731a8d07548..00000000000
--- a/pkgs/development/compilers/icedtea/cppflags-include-fix.patch
+++ /dev/null
@@ -1,17 +0,0 @@
-diff --git openjdk-orig/jdk/make/sun/awt/mawt.gmk openjdk/jdk/make/sun/awt/mawt.gmk
-index c6ab06d..23a14da 100644
---- openjdk-orig/jdk/make/sun/awt/mawt.gmk
-+++ openjdk/jdk/make/sun/awt/mawt.gmk
-@@ -270,12 +270,6 @@ LDFLAGS += -L$(MOTIF_LIB) -L$(OPENWIN_LIB)
- endif # !HEADLESS
- endif # PLATFORM
-
--ifeq ($(PLATFORM), linux)
-- # Checking for the X11/extensions headers at the additional location
-- CPPFLAGS += -I$(firstword $(wildcard $(OPENWIN_HOME)/include/X11/extensions) \
-- $(wildcard /usr/include/X11/extensions))
--endif
--
- ifeq ($(PLATFORM), macosx)
- CPPFLAGS += -I$(OPENWIN_HOME)/include/X11/extensions \
- -I$(OPENWIN_HOME)/include
diff --git a/pkgs/development/compilers/icedtea/default.nix b/pkgs/development/compilers/icedtea/default.nix
deleted file mode 100644
index fe7ec585155..00000000000
--- a/pkgs/development/compilers/icedtea/default.nix
+++ /dev/null
@@ -1,181 +0,0 @@
-{ stdenv, fetchurl, jdk, ant, wget, zip, unzip, cpio, file, libxslt
-, xorg, zlib, pkgconfig, libjpeg, libpng, giflib, lcms2, gtk2, kerberos, attr
-, alsaLib, procps, automake, autoconf, cups, which, perl, coreutils, binutils
-, cacert, setJavaClassPath
-}:
-
-let
-
- /**
- * The JRE libraries are in directories that depend on the CPU.
- */
- architecture =
- if stdenv.system == "i686-linux" then
- "i386"
- else if stdenv.system == "x86_64-linux" then
- "amd64"
- else
- throw "icedtea requires i686-linux or x86_64 linux";
-
- srcInfo = (import ./sources.nix).icedtea7;
-
- pkgName = "icedtea7-${srcInfo.version}";
-
- defSrc = name:
- with (builtins.getAttr name srcInfo.bundles); fetchurl {
- inherit url sha256;
- name = "${pkgName}-${baseNameOf url}";
- };
-
- bundleNames = builtins.attrNames srcInfo.bundles;
-
- sources = stdenv.lib.genAttrs bundleNames (name: defSrc name);
-
- bundleFun = name: "--with-${name}-src-zip=" + builtins.getAttr name sources;
- bundleFlags = map bundleFun bundleNames;
-
- icedtea = stdenv.mkDerivation (with srcInfo; {
- name = pkgName;
-
- src = fetchurl {
- inherit url sha256;
- };
-
- outputs = [ "out" "jre" ];
-
- # TODO: Probably some more dependencies should be on this list but are being
- # propagated instead
- buildInputs = [
- jdk ant wget zip unzip cpio file libxslt pkgconfig procps automake
- autoconf which perl coreutils xorg.lndir
- zlib libjpeg libpng giflib lcms2 kerberos attr alsaLib cups
- xorg.libX11 xorg.libXtst gtk2
- ];
-
- configureFlags = bundleFlags ++ [
- "--disable-bootstrap"
- "--disable-downloading"
-
- "--without-rhino"
- "--with-pax=paxctl"
- "--with-jdk-home=${jdk.home}"
- ];
-
- preConfigure = ''
- unset JAVA_HOME JDK_HOME CLASSPATH JAVAC JAVACFLAGS
-
- substituteInPlace javac.in --replace '#!/usr/bin/perl' '#!${perl}/bin/perl'
- substituteInPlace javah.in --replace '#!/usr/bin/perl' '#!${perl}/bin/perl'
-
- ./autogen.sh
- '';
-
- preBuild = ''
- make stamps/extract.stamp
-
- substituteInPlace openjdk/jdk/make/common/shared/Defs-utils.gmk --replace '/bin/echo' '${coreutils}/bin/echo'
- substituteInPlace openjdk/corba/make/common/shared/Defs-utils.gmk --replace '/bin/echo' '${coreutils}/bin/echo'
-
- patch -p0 < ${./cppflags-include-fix.patch}
- patch -p0 < ${./fix-java-home.patch}
- '';
-
- NIX_NO_SELF_RPATH = true;
-
- makeFlags = [
- "ALSA_INCLUDE=${alsaLib}/include/alsa/version.h"
- "ALT_UNIXCOMMAND_PATH="
- "ALT_USRBIN_PATH="
- "ALT_DEVTOOLS_PATH="
- "ALT_COMPILER_PATH="
- "ALT_CUPS_HEADERS_PATH=${cups}/include"
- "ALT_OBJCOPY=${binutils}/bin/objcopy"
- "SORT=${coreutils}/bin/sort"
- "UNLIMITED_CRYPTO=1"
- ];
-
- installPhase = ''
- mkdir -p $out/lib/icedtea $out/share $jre/lib/icedtea
-
- cp -av openjdk.build/j2sdk-image/* $out/lib/icedtea
-
- # Move some stuff to top-level.
- mv $out/lib/icedtea/include $out/include
- mv $out/lib/icedtea/man $out/share/man
-
- # jni.h expects jni_md.h to be in the header search path.
- ln -s $out/include/linux/*_md.h $out/include/
-
- # Remove some broken manpages.
- rm -rf $out/share/man/ja*
-
- # Remove crap from the installation.
- rm -rf $out/lib/icedtea/demo $out/lib/icedtea/sample
-
- # Move the JRE to a separate output.
- mv $out/lib/icedtea/jre $jre/lib/icedtea/
- mkdir $out/lib/icedtea/jre
- lndir $jre/lib/icedtea/jre $out/lib/icedtea/jre
-
- # The following files cannot be symlinked, as it seems to violate Java security policies
- rm $out/lib/icedtea/jre/lib/ext/*
- cp $jre/lib/icedtea/jre/lib/ext/* $out/lib/icedtea/jre/lib/ext/
-
- rm -rf $out/lib/icedtea/jre/bin
- ln -s $out/lib/icedtea/bin $out/lib/icedtea/jre/bin
-
- # Remove duplicate binaries.
- for i in $(cd $out/lib/icedtea/bin && echo *); do
- if [ "$i" = java ]; then continue; fi
- if cmp -s $out/lib/icedtea/bin/$i $jre/lib/icedtea/jre/bin/$i; then
- ln -sfn $jre/lib/icedtea/jre/bin/$i $out/lib/icedtea/bin/$i
- fi
- done
-
- # Generate certificates.
- pushd $jre/lib/icedtea/jre/lib/security
- rm cacerts
- perl ${./generate-cacerts.pl} $jre/lib/icedtea/jre/bin/keytool ${cacert}/ca-bundle.crt
- popd
-
- ln -s $out/lib/icedtea/bin $out/bin
- ln -s $jre/lib/icedtea/jre/bin $jre/bin
- '';
-
- # FIXME: this is unnecessary once the multiple-outputs branch is merged.
- preFixup = ''
- prefix=$jre stripDirs "$stripDebugList" "''${stripDebugFlags:--S}"
- patchELF $jre
- propagatedNativeBuildInputs+=" $jre"
-
- # Propagate the setJavaClassPath setup hook from the JRE so that
- # any package that depends on the JRE has $CLASSPATH set up
- # properly.
- mkdir -p $jre/nix-support
- echo -n "${setJavaClassPath}" > $jre/nix-support/propagated-native-build-inputs
-
- # Set JAVA_HOME automatically.
- mkdir -p $out/nix-support
- cat < $out/nix-support/setup-hook
- if [ -z "\$JAVA_HOME" ]; then export JAVA_HOME=$out/lib/icedtea; fi
- EOF
- '';
-
- meta = {
- description = "Free Java development kit based on OpenJDK 7.0 and the IcedTea project";
- longDescription = ''
- Free Java environment based on OpenJDK 7.0 and the IcedTea project.
- - Full Java runtime environment
- - Needed for executing Java Webstart programs and the free Java web browser plugin.
- '';
- homepage = http://icedtea.classpath.org;
- maintainers = with stdenv.lib.maintainers; [ wizeman ];
- platforms = stdenv.lib.platforms.linux;
- };
-
- passthru = {
- inherit architecture;
- home = "${icedtea}/lib/icedtea";
- };
- });
-in icedtea
diff --git a/pkgs/development/compilers/icedtea/fix-java-home.patch b/pkgs/development/compilers/icedtea/fix-java-home.patch
deleted file mode 100644
index 5def344f171..00000000000
--- a/pkgs/development/compilers/icedtea/fix-java-home.patch
+++ /dev/null
@@ -1,17 +0,0 @@
-diff -ru -x '*~' openjdk-orig/hotspot/src/os/linux/vm/os_linux.cpp openjdk/hotspot/src/os/linux/vm/os_linux.cpp
---- openjdk-orig/hotspot/src/os/linux/vm/os_linux.cpp 2013-09-06 20:22:03.000000000 +0200
-+++ openjdk/hotspot/src/os/linux/vm/os_linux.cpp 2014-01-24 22:44:08.223857012 +0100
-@@ -2358,12 +2358,10 @@
- CAST_FROM_FN_PTR(address, os::jvm_path),
- dli_fname, sizeof(dli_fname), NULL);
- assert(ret, "cannot locate libjvm");
- char *rp = NULL;
- if (ret && dli_fname[0] != '\0') {
-- rp = realpath(dli_fname, buf);
-+ snprintf(buf, buflen, "%s", dli_fname);
- }
-- if (rp == NULL)
-- return;
-
- if (Arguments::created_by_gamma_launcher()) {
- // Support for the gamma launcher. Typical value for buf is
diff --git a/pkgs/development/compilers/icedtea/generate-cacerts.pl b/pkgs/development/compilers/icedtea/generate-cacerts.pl
deleted file mode 100644
index 3bdd42f7274..00000000000
--- a/pkgs/development/compilers/icedtea/generate-cacerts.pl
+++ /dev/null
@@ -1,366 +0,0 @@
-#!/usr/bin/perl
-
-# Copyright (C) 2007, 2008 Red Hat, Inc.
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation; either version 2 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-
-# generate-cacerts.pl generates a JKS keystore named 'cacerts' from
-# OpenSSL's certificate bundle using OpenJDK's keytool.
-
-# First extract each of OpenSSL's bundled certificates into its own
-# aliased filename.
-
-# Downloaded from http://cvs.fedoraproject.org/viewvc/rpms/ca-certificates/F-12/generate-cacerts.pl?revision=1.2
-# Check and prevention of duplicate aliases added by Vlastimil Babka
-
-$file = $ARGV[1];
-open(CERTS, $file);
-@certs = ;
-close(CERTS);
-
-$pem_file_count = 0;
-$in_cert_block = 0;
-$write_current_cert = 1;
-foreach $cert (@certs)
-{
- if ($cert =~ /Issuer: /)
- {
- $_ = $cert;
- if ($cert =~ /personal-freemail/)
- {
- $cert_alias = "thawtepersonalfreemailca";
- }
- elsif ($cert =~ /personal-basic/)
- {
- $cert_alias = "thawtepersonalbasicca";
- }
- elsif ($cert =~ /personal-premium/)
- {
- $cert_alias = "thawtepersonalpremiumca";
- }
- elsif ($cert =~ /server-certs/)
- {
- $cert_alias = "thawteserverca";
- }
- elsif ($cert =~ /premium-server/)
- {
- $cert_alias = "thawtepremiumserverca";
- }
- elsif ($cert =~ /Class 1 Public Primary Certification Authority$/)
- {
- $cert_alias = "verisignclass1ca";
- }
- elsif ($cert =~ /Class 1 Public Primary Certification Authority - G2/)
- {
- $cert_alias = "verisignclass1g2ca";
- }
- elsif ($cert =~
- /VeriSign Class 1 Public Primary Certification Authority - G3/)
- {
- $cert_alias = "verisignclass1g3ca";
- }
- elsif ($cert =~ /Class 2 Public Primary Certification Authority$/)
- {
- $cert_alias = "verisignclass2ca";
- }
- elsif ($cert =~ /Class 2 Public Primary Certification Authority - G2/)
- {
- $cert_alias = "verisignclass2g2ca";
- }
- elsif ($cert =~
- /VeriSign Class 2 Public Primary Certification Authority - G3/)
- {
- $cert_alias = "verisignclass2g3ca";
- }
- elsif ($cert =~ /Class 3 Public Primary Certification Authority$/)
- {
- $cert_alias = "verisignclass3ca";
- }
- # Version 1 of Class 3 Public Primary Certification Authority
- # - G2 is added. Version 3 is excluded. See below.
- elsif ($cert =~
- /VeriSign Class 3 Public Primary Certification Authority - G3/)
- {
- $cert_alias = "verisignclass3g3ca";
- }
- elsif ($cert =~
- /RSA Data Security.*Secure Server Certification Authority/)
- {
- $cert_alias = "verisignserverca";
- }
- elsif ($cert =~ /GTE CyberTrust Global Root/)
- {
- $cert_alias = "gtecybertrustglobalca";
- }
- elsif ($cert =~ /Baltimore CyberTrust Root/)
- {
- $cert_alias = "baltimorecybertrustca";
- }
- elsif ($cert =~ /www.entrust.net\/Client_CA_Info\/CPS/)
- {
- $cert_alias = "entrustclientca";
- }
- elsif ($cert =~ /www.entrust.net\/GCCA_CPS/)
- {
- $cert_alias = "entrustglobalclientca";
- }
- elsif ($cert =~ /www.entrust.net\/CPS_2048/)
- {
- $cert_alias = "entrust2048ca";
- }
- elsif ($cert =~ /www.entrust.net\/CPS /)
- {
- $cert_alias = "entrustsslca";
- }
- elsif ($cert =~ /www.entrust.net\/SSL_CPS/)
- {
- $cert_alias = "entrustgsslca";
- }
- elsif ($cert =~ /The Go Daddy Group/)
- {
- $cert_alias = "godaddyclass2ca";
- }
- elsif ($cert =~ /Starfield Class 2 Certification Authority/)
- {
- $cert_alias = "starfieldclass2ca";
- }
- elsif ($cert =~ /ValiCert Class 2 Policy Validation Authority/)
- {
- $cert_alias = "valicertclass2ca";
- }
- elsif ($cert =~ /GeoTrust Global CA$/)
- {
- $cert_alias = "geotrustglobalca";
- }
- elsif ($cert =~ /Equifax Secure Certificate Authority/)
- {
- $cert_alias = "equifaxsecureca";
- }
- elsif ($cert =~ /Equifax Secure eBusiness CA-1/)
- {
- $cert_alias = "equifaxsecureebusinessca1";
- }
- elsif ($cert =~ /Equifax Secure eBusiness CA-2/)
- {
- $cert_alias = "equifaxsecureebusinessca2";
- }
- elsif ($cert =~ /Equifax Secure Global eBusiness CA-1/)
- {
- $cert_alias = "equifaxsecureglobalebusinessca1";
- }
- elsif ($cert =~ /Sonera Class1 CA/)
- {
- $cert_alias = "soneraclass1ca";
- }
- elsif ($cert =~ /Sonera Class2 CA/)
- {
- $cert_alias = "soneraclass2ca";
- }
- elsif ($cert =~ /AAA Certificate Services/)
- {
- $cert_alias = "comodoaaaca";
- }
- elsif ($cert =~ /AddTrust Class 1 CA Root/)
- {
- $cert_alias = "addtrustclass1ca";
- }
- elsif ($cert =~ /AddTrust External CA Root/)
- {
- $cert_alias = "addtrustexternalca";
- }
- elsif ($cert =~ /AddTrust Qualified CA Root/)
- {
- $cert_alias = "addtrustqualifiedca";
- }
- elsif ($cert =~ /UTN-USERFirst-Hardware/)
- {
- $cert_alias = "utnuserfirsthardwareca";
- }
- elsif ($cert =~ /UTN-USERFirst-Client Authentication and Email/)
- {
- $cert_alias = "utnuserfirstclientauthemailca";
- }
- elsif ($cert =~ /UTN - DATACorp SGC/)
- {
- $cert_alias = "utndatacorpsgcca";
- }
- elsif ($cert =~ /UTN-USERFirst-Object/)
- {
- $cert_alias = "utnuserfirstobjectca";
- }
- elsif ($cert =~ /America Online Root Certification Authority 1/)
- {
- $cert_alias = "aolrootca1";
- }
- elsif ($cert =~ /DigiCert Assured ID Root CA/)
- {
- $cert_alias = "digicertassuredidrootca";
- }
- elsif ($cert =~ /DigiCert Global Root CA/)
- {
- $cert_alias = "digicertglobalrootca";
- }
- elsif ($cert =~ /DigiCert High Assurance EV Root CA/)
- {
- $cert_alias = "digicerthighassuranceevrootca";
- }
- elsif ($cert =~ /GlobalSign Root CA$/)
- {
- $cert_alias = "globalsignca";
- }
- elsif ($cert =~ /GlobalSign Root CA - R2/)
- {
- $cert_alias = "globalsignr2ca";
- }
- elsif ($cert =~ /Elektronik.*Kas.*2005/)
- {
- $cert_alias = "extra-elektronikkas2005";
- }
- elsif ($cert =~ /Elektronik/)
- {
- $cert_alias = "extra-elektronik2005";
- }
- # Mozilla does not provide these certificates:
- # baltimorecodesigningca
- # gtecybertrust5ca
- # trustcenterclass2caii
- # trustcenterclass4caii
- # trustcenteruniversalcai
- else
- {
- # Generate an alias using the OU and CN attributes of the
- # Issuer field if both are present, otherwise use only the
- # CN attribute. The Issuer field must have either the OU
- # or the CN attribute.
- $_ = $cert;
- if ($cert =~ /OU=/)
- {
- s/Issuer:.*?OU=//;
- # Remove other occurrences of OU=.
- s/OU=.*CN=//;
- # Remove CN= if there were not other occurrences of OU=.
- s/CN=//;
- s/\/emailAddress.*//;
- s/Certificate Authority/ca/g;
- s/Certification Authority/ca/g;
- }
- elsif ($cert =~ /CN=/)
- {
- s/Issuer:.*CN=//;
- s/\/emailAddress.*//;
- s/Certificate Authority/ca/g;
- s/Certification Authority/ca/g;
- }
- s/\W//g;
- tr/A-Z/a-z/;
- $cert_alias = "extra-$_";
-
- }
- while (-e "$cert_alias.pem")
- {
- $cert_alias = "$cert_alias" . "_";
- }
- }
- # When it attempts to parse:
- #
- # Class 3 Public Primary Certification Authority - G2, Version 3
- #
- # keytool says:
- #
- # #2: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
- # Unparseable AuthorityInfoAccess extension due to
- # java.io.IOException: Invalid encoding of URI
- #
- # If we do not exclude this file
- # openjdk/jdk/test/lib/security/cacerts/VerifyCACerts.java fails
- # on this cert, printing:
- #
- # Couldn't verify: java.security.SignatureException: Signature
- # does not match.
- #
- elsif ($cert =~
- /A6:0F:34:C8:62:6C:81:F6:8B:F7:7D:A9:F6:67:58:8A:90:3F:7D:36/)
- {
- $write_current_cert = 0;
- $pem_file_count--;
- }
- elsif ($cert eq "-----BEGIN CERTIFICATE-----\n")
- {
- $_ = $cert;
- s/\W//g;
- tr/A-Z/a-z/;
- $cert_alias = "extra-$_";
- while (-e "$cert_alias.pem")
- {
- $cert_alias = "$cert_alias" . "_";
- }
- if ($in_cert_block != 0)
- {
- die "$file is malformed.";
- }
- $in_cert_block = 1;
- if ($write_current_cert == 1)
- {
- $pem_file_count++;
- if (-e "$cert_alias.pem")
- {
- print "$cert_alias";
- die "already exists"
- }
- open(PEM, ">$cert_alias.pem");
- print PEM $cert;
- }
- }
- elsif ($cert eq "-----END CERTIFICATE-----\n")
- {
- $in_cert_block = 0;
- if ($write_current_cert == 1)
- {
- print PEM $cert;
- close(PEM);
- }
- $write_current_cert = 1
- }
- else
- {
- if ($in_cert_block == 1 && $write_current_cert == 1)
- {
- print PEM $cert;
- }
- }
-}
-
-# Check that the correct number of .pem files were produced.
-@pem_files = <*.pem>;
-if (@pem_files != $pem_file_count)
-{
- print "$pem_file_count";
- die "Number of .pem files produced does not match".
- " number of certs read from $file.";
-}
-
-# Now store each cert in the 'cacerts' file using keytool.
-$certs_written_count = 0;
-foreach $pem_file (@pem_files)
-{
- system "$ARGV[0] -noprompt -import".
- " -alias `basename $pem_file .pem`".
- " -keystore cacerts -storepass 'changeit' -file $pem_file";
- unlink($pem_file);
- $certs_written_count++;
-}
-
-# Check that the correct number of certs were added to the keystore.
-if ($certs_written_count != $pem_file_count)
-{
- die "Number of certs added to keystore does not match".
- " number of certs read from $file.";
-}
diff --git a/pkgs/development/compilers/icedtea/sources.nix b/pkgs/development/compilers/icedtea/sources.nix
deleted file mode 100644
index 80d96b4660a..00000000000
--- a/pkgs/development/compilers/icedtea/sources.nix
+++ /dev/null
@@ -1,48 +0,0 @@
-# This file is autogenerated from update.py in the same directory.
-{
- icedtea7 = rec {
- version = "2.5.5";
-
- url = "http://icedtea.wildebeest.org/download/source/icedtea-${version}.tar.xz";
- sha256 = "1irxk2ndwsfk4c1zbzb5h3rpwv2bc9bhfjvz6p4dws5476vsxrq9";
-
- common_url = "http://icedtea.classpath.org/download/drops/icedtea7/${version}";
-
- bundles = {
- openjdk = rec {
- url = "${common_url}/openjdk.tar.bz2";
- sha256 = "5301baacfb6b4ee28a3469b8429a0017898615532f727bb50d94777682c5fd0d";
- };
-
- corba = rec {
- url = "${common_url}/corba.tar.bz2";
- sha256 = "f0576599b474f56e58068071242cedbbf2f181b58c9010b614c9096be764ac51";
- };
-
- jaxp = rec {
- url = "${common_url}/jaxp.tar.bz2";
- sha256 = "293218d595763f7e02a91ea88860e5314e42330cbc21b73dc5de32e7e26fd256";
- };
-
- jaxws = rec {
- url = "${common_url}/jaxws.tar.bz2";
- sha256 = "76d6d0670ede806b01d39e07c644e423a50984f1cf0ec560afa23f0fedf575be";
- };
-
- jdk = rec {
- url = "${common_url}/jdk.tar.bz2";
- sha256 = "c1bc0d25457ccf40fcaeb5311052f6d2fbab8ef316b0381995835827711da483";
- };
-
- langtools = rec {
- url = "${common_url}/langtools.tar.bz2";
- sha256 = "71b269ea930da36d751c6183816ef53a65c0587b7cf0195f87759b4c02c3b660";
- };
-
- hotspot = rec {
- url = "${common_url}/hotspot.tar.bz2";
- sha256 = "d724a9749f51a3c66351ad8a27bc4570640720eace33cd03f1a52e2e45731dfb";
- };
- };
- };
-}
diff --git a/pkgs/development/compilers/icedtea/update.py b/pkgs/development/compilers/icedtea/update.py
deleted file mode 100755
index c41cf3d38d2..00000000000
--- a/pkgs/development/compilers/icedtea/update.py
+++ /dev/null
@@ -1,261 +0,0 @@
-#!/usr/bin/env python3
-
-import subprocess, urllib.request, re, os, tarfile
-from html.parser import HTMLParser
-
-URL = 'http://icedtea.classpath.org/download/drops/icedtea{}/{}'
-DOWNLOAD_URL = 'http://icedtea.wildebeest.org/download/source/'
-DOWNLOAD_HTML = DOWNLOAD_URL + '?C=M;O=D'
-
-ICEDTEA_JDKS = [7]
-
-BUNDLES = ['openjdk', 'corba', 'jaxp', 'jaxws', 'jdk', 'langtools', 'hotspot']
-
-SRC_PATH = './sources.nix'
-
-def get_output(cmd, env = None):
- try:
- proc = subprocess.Popen(cmd, env = env, stdout = subprocess.PIPE)
- out = proc.communicate()[0]
- except subprocess.CalledProcessError as e:
- return None
-
- return out.decode('utf-8').strip()
-
-def nix_prefetch_url(url):
- env = os.environ.copy()
- env['PRINT_PATH'] = '1'
- out = get_output(['nix-prefetch-url', url], env = env)
-
- return out.split('\n')
-
-def get_nix_attr(path, attr):
- out = get_output(['nix-instantiate', '--eval-only', '-A', attr, path])
-
- if len(out) < 2 or out[0] != '"' or out[-1] != '"':
- raise Exception('Cannot find Nix attribute "{}" (parsing failure?)'.format(attr))
-
- # Strip quotes
- return out[1:-1]
-
-def get_jdk_attr(jdk, attr):
- return get_nix_attr(SRC_PATH, 'icedtea{}.{}'.format(jdk, attr))
-
-class Parser(HTMLParser):
- def __init__(self, link_regex):
- HTMLParser.__init__(self)
-
- self.regex = link_regex
- self.href = None
- self.version = None
-
- def handle_starttag(self, tag, attrs):
- if self.href != None or tag != 'a':
- return
-
- href = None
- for attr in attrs:
- if attr[0] == 'href':
- href = attr[1]
- if href == None:
- return
-
- m = re.match(self.regex, href)
- if m != None:
- self.href = href
- self.version = m.group(1)
-
-def get_latest_version_url(major):
- f = urllib.request.urlopen(DOWNLOAD_HTML)
- html = f.read().decode('utf-8')
- f.close()
-
- parser = Parser(r'^icedtea\d?-({}\.\d[\d.]*)\.tar\.xz$'.format(major))
- parser.feed(html)
- parser.close()
-
- if parser.href == None:
- raise Exception('Error: could not find download url for major version "{}"'.format(major))
-
- return parser.version, DOWNLOAD_URL + parser.href
-
-def get_old_bundle_attrs(jdk, bundle):
- attrs = {}
- for attr in ('url', 'sha256'):
- attrs[attr] = get_jdk_attr(jdk, 'bundles.{}.{}'.format(bundle, attr))
-
- return attrs
-
-def get_old_attrs(jdk):
- attrs = {}
-
- for attr in ('version', 'url', 'sha256'):
- attrs[attr] = get_jdk_attr(jdk, attr)
-
- attrs['bundles'] = {}
-
- for bundle in BUNDLES:
- attrs['bundles'][bundle] = get_old_bundle_attrs(jdk, bundle)
-
- return attrs
-
-def get_member_filename(tarball, name):
- for fname in tarball.getnames():
- m = re.match(r'^icedtea\d?-\d[\d.]*/{}$'.format(name), fname)
- if m != None:
- return m.group(0)
-
- return None
-
-def get_member_file(tarball, name):
- path = get_member_filename(tarball, name)
- if path == None:
- raise Exception('Could not find "{}" inside tarball'.format(name))
-
- f = tarball.extractfile(path)
- data = f.read().decode('utf-8')
- f.close()
-
- return data
-
-def get_new_bundle_attr(makefile, bundle, attr):
- var = '{}_{}'.format(bundle.upper(), attr.upper())
- regex = r'^{} = (.*?)$'.format(var)
-
- m = re.search(regex, makefile, re.MULTILINE)
- if m == None:
- raise Exception('Could not find variable "{}" in Makefile.am'.format(var))
-
- return m.group(1)
-
-def get_new_bundle_attrs(jdk, version, path):
- url = URL.format(jdk, version)
-
- attrs = {}
-
- print('Opening file: "{}"'.format(path))
- tar = tarfile.open(name = path, mode = 'r:xz')
-
- makefile = get_member_file(tar, 'Makefile.am')
- hotspot_map = get_member_file(tar, 'hotspot.map.in')
-
- hotspot_map = hotspot_map.replace('@ICEDTEA_RELEASE@', version)
-
- for bundle in BUNDLES:
- battrs = {}
-
- battrs['url'] = '{}/{}.tar.bz2'.format(url, bundle)
- if bundle == 'hotspot':
- m = re.search(r'^default (.*?) (.*?) (.*?) (.*?)$', hotspot_map, re.MULTILINE)
- if m == None:
- raise Exception('Could not find info for hotspot bundle in hotspot.map.in')
-
- battrs['sha256'] = m.group(4)
- else:
- battrs['sha256'] = get_new_bundle_attr(makefile, bundle, 'sha256sum')
-
- attrs[bundle] = battrs
-
- tar.close()
-
- return attrs
-
-def get_new_attrs(jdk):
- print('Getting old attributes for JDK {}...'.format(jdk))
- old_attrs = get_old_attrs(jdk)
- attrs = {}
-
- # The major version corresponds to a specific JDK (1 = OpenJDK6, 2 = OpenJDK7, 3 = OpenJDK8)
- major = jdk - 5
-
- print('Getting latest version for JDK {}...'.format(jdk))
- version, url = get_latest_version_url(major)
-
- print()
- print('Old version: {}'.format(old_attrs['version']))
- print('New version: {}'.format(version))
- print()
-
- if version == old_attrs['version']:
- print('No update available, skipping...')
- print()
- return old_attrs
-
- print('Update available, generating new attributes for JDK {}...'.format(jdk))
-
- attrs['version'] = version
- attrs['url'] = url
-
- print('Downloading tarball from url "{}"...'.format(url))
- print()
- attrs['sha256'], path = nix_prefetch_url(url)
- print()
-
- print('Inspecting tarball for bundle information...')
-
- attrs['bundles'] = get_new_bundle_attrs(jdk, attrs['version'], path)
-
- print('Done!')
-
- return attrs
-
-def generate_jdk(jdk):
- attrs = get_new_attrs(jdk)
-
- version = attrs['version']
- src_url = attrs['url'].replace(version, '${version}')
-
- common_url = URL.format(jdk, version)
- src_common_url = URL.format(jdk, '${version}')
-
- src = ' icedtea{} = rec {{\n'.format(jdk)
- src += ' version = "{}";\n'.format(version)
- src += '\n'
- src += ' url = "{}";\n'.format(src_url)
- src += ' sha256 = "{}";\n'.format(attrs['sha256'])
- src += '\n'
- src += ' common_url = "{}";\n'.format(src_common_url)
- src += '\n'
- src += ' bundles = {\n'
-
- for bundle in BUNDLES:
- battrs = attrs['bundles'][bundle]
-
- b_url = battrs['url']
- b_url = b_url.replace(common_url, '${common_url}')
-
- src += ' {} = rec {{\n'.format(bundle)
- src += ' url = "{}";\n'.format(b_url)
- src += ' sha256 = "{}";\n'.format(battrs['sha256'])
- src += ' };\n'
-
- if bundle != BUNDLES[-1]:
- src += '\n'
-
- src += ' };\n'
- src += ' };\n'
-
- return src
-
-def generate_sources(jdks):
- src = '# This file is autogenerated from update.py in the same directory.\n'
- src += '{\n'
-
- for jdk in jdks:
- print()
- print('Generating sources for JDK {}...'.format(jdk))
- src += generate_jdk(jdk)
-
- src += '}\n'
- return src
-
-if __name__ == '__main__':
- print('Generating {}...'.format(SRC_PATH))
- src = generate_sources(ICEDTEA_JDKS)
-
- f = open(SRC_PATH, 'w', encoding = 'utf-8')
- f.write(src)
- f.close()
-
- print()
- print('Update complete!')
diff --git a/pkgs/development/compilers/julia/0.2.nix b/pkgs/development/compilers/julia/0.2.nix
index cc1be3db8a5..9d585e07fe1 100644
--- a/pkgs/development/compilers/julia/0.2.nix
+++ b/pkgs/development/compilers/julia/0.2.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchgit, gfortran, perl, m4, llvm, gmp, pcre, zlib
, readline, fftwSinglePrec, fftw, libunwind, suitesparse, glpk, fetchurl
- , ncurses, libunistring, lighttpd, patchelf, openblas, liblapack
+ , ncurses, libunistring, lighttpd, patchelf, openblas
, tcl, tk, xproto, libX11, git, mpfr
} :
let
@@ -71,7 +71,7 @@ stdenv.mkDerivation rec {
buildInputs = [ gfortran perl m4 gmp pcre llvm readline zlib
fftw fftwSinglePrec libunwind suitesparse glpk ncurses libunistring patchelf
- openblas liblapack tcl tk xproto libX11 git mpfr
+ openblas tcl tk xproto libX11 git mpfr
];
configurePhase = ''
@@ -91,14 +91,13 @@ stdenv.mkDerivation rec {
copy_kill_hash "${dsfmt_src}" deps/random
${if realGcc ==null then "" else
- ''export NIX_LDFLAGS="$NIX_LDFLAGS -L${realGcc}/lib -L${realGcc}/lib64 -lpcre -llapack -lm -lfftw3f -lfftw3 -lglpk -lunistring -lz -lgmp -lmpfr"''}
+ ''export NIX_LDFLAGS="$NIX_LDFLAGS -L${realGcc}/lib -L${realGcc}/lib64 -lpcre -lopenblas -lm -lfftw3f -lfftw3 -lglpk -lunistring -lz -lgmp -lmpfr"''}
export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -fPIC "
export LDFLAGS="-L${suitesparse}/lib -L$out/lib/julia -Wl,-rpath,$out/lib/julia"
export GLPK_PREFIX="${glpk}/include"
- mkdir -p "$out/lib"
sed -e "s@/usr/local/lib@$out/lib@g" -i deps/Makefile
sed -e "s@/usr/lib@$out/lib@g" -i deps/Makefile
@@ -111,9 +110,12 @@ stdenv.mkDerivation rec {
preBuild = ''
mkdir -p usr/lib
-
- echo "$out"
+
mkdir -p "$out/lib"
+ ln -s "${openblas}/lib/libopenblas.so" "$out/lib/libblas.so"
+ ln -s "${openblas}/lib/libopenblas.so" "$out/lib/liblapack.so"
+
+ echo "$out"
(
cd "$(mktemp -d)"
for i in "${suitesparse}"/lib/lib*.a; do
diff --git a/pkgs/development/compilers/julia/0.3.nix b/pkgs/development/compilers/julia/0.3.nix
index 9f216c7207f..4566752340f 100644
--- a/pkgs/development/compilers/julia/0.3.nix
+++ b/pkgs/development/compilers/julia/0.3.nix
@@ -1,142 +1,134 @@
-{ stdenv, fetchgit, gfortran, perl, m4, llvm, gmp, pcre, zlib
- , readline, fftwSinglePrec, fftw, libunwind, suitesparse, glpk, fetchurl
- , ncurses, libunistring, patchelf, openblas, liblapack
- , tcl, tk, xproto, libX11, git, mpfr, which, wget
- } :
+{ stdenv, fetchgit, fetchurl
+# build tools
+, gfortran, git, m4, patchelf, perl, which
+# libjulia dependencies
+, libunwind, llvm, readline, utf8proc, zlib
+# standard library dependencies
+, double_conversion, fftwSinglePrec, fftw, glpk, gmp, mpfr, pcre
+, openblas, arpack, suitesparse
+}:
-assert stdenv.isLinux;
+with stdenv.lib;
-let
- realGcc = stdenv.cc.cc;
-in
stdenv.mkDerivation rec {
pname = "julia";
- version = "0.3.6";
+ version = "0.3.9";
name = "${pname}-${version}";
- dsfmt_ver = "2.2";
- grisu_ver = "1.1.1";
- openblas_ver = "v0.2.13";
- lapack_ver = "3.5.0";
- arpack_ver = "3.1.5";
- patchelf_ver = "0.8";
- pcre_ver = "8.36";
- utf8proc_ver = "1.1.6";
-
- dsfmt_src = fetchurl {
- url = "http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/SFMT/dSFMT-src-${dsfmt_ver}.tar.gz";
- name = "dsfmt-${dsfmt_ver}.tar.gz";
- md5 = "cb61be3be7254eae39684612c524740d";
- };
- grisu_src = fetchurl {
- url = "http://double-conversion.googlecode.com/files/double-conversion-${grisu_ver}.tar.gz";
- md5 = "29b533ed4311161267bff1a9a97e2953";
- };
- openblas_src = fetchurl {
- url = "https://github.com/xianyi/OpenBLAS/tarball/${openblas_ver}";
- name = "openblas-${openblas_ver}.tar.gz";
- md5 = "74adf4c0d0d82bff4774be5bf2134183";
- };
- arpack_src = fetchurl rec {
- url = "https://github.com/opencollab/arpack-ng/archive/${arpack_ver}.tar.gz";
- md5 = "d84e1b6108d9ee67c0d21aba7099e953";
- name = "arpack-ng-${arpack_ver}.tar.gz";
- };
- lapack_src = fetchurl {
- url = "http://www.netlib.org/lapack/lapack-${lapack_ver}.tgz";
- name = "lapack-${lapack_ver}.tgz";
- md5 = "b1d3e3e425b2e44a06760ff173104bdf";
- };
- patchelf_src = fetchurl {
- url = "http://hydra.nixos.org/build/1524660/download/2/patchelf-${patchelf_ver}.tar.bz2";
- md5 = "5087261514b4b5814a39c3d3a36eb6ef";
- };
- pcre_src = fetchurl {
- url = "ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-${pcre_ver}.tar.bz2";
- md5 = "b767bc9af0c20bc9c1fe403b0d41ad97";
- };
- utf8proc_src = fetchurl {
- url = "http://www.public-software-group.org/pub/projects/utf8proc/v${utf8proc_ver}/utf8proc-v${utf8proc_ver}.tar.gz";
- md5 = "2462346301fac2994c34f5574d6c3ca7";
- };
-
src = fetchgit {
url = "git://github.com/JuliaLang/julia.git";
rev = "refs/tags/v${version}";
- md5 = "d28e8f428485219f756d80c011d5dd32";
+ sha256 = "ad0820affefd04eb6fba7deb2603756974711846a251900a9202b8d2665a37cf";
name = "julia-git-v${version}";
};
- buildInputs = [ gfortran perl m4 gmp pcre llvm readline zlib
- fftw fftwSinglePrec libunwind suitesparse glpk ncurses libunistring patchelf
- openblas liblapack tcl tk xproto libX11 git mpfr which wget
- ];
+ patches = [ ./0001-work-around-buggy-wcwidth.patch ];
- configurePhase = ''
- for i in GMP LLVM PCRE READLINE FFTW LIBUNWIND SUITESPARSE GLPK ZLIB MPFR;
- do
- makeFlags="$makeFlags USE_SYSTEM_$i=1 "
- done
- makeFlags="$makeFlags JULIA_CPU_TARGET=core2";
+ extraSrcs =
+ let
+ dsfmt_ver = "2.2";
+ dsfmt_src = fetchurl {
+ url = "http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/SFMT/dSFMT-src-${dsfmt_ver}.tar.gz";
+ name = "dsfmt-${dsfmt_ver}.tar.gz";
+ md5 = "cb61be3be7254eae39684612c524740d";
+ };
+ in [ dsfmt_src ];
+
+ prePatch = ''
copy_kill_hash(){
cp "$1" "$2/$(basename "$1" | sed -e 's/^[a-z0-9]*-//')"
}
- for i in "${grisu_src}" "${dsfmt_src}" "${arpack_src}" "${patchelf_src}" \
- "${pcre_src}" "${utf8proc_src}" "${lapack_src}" "${openblas_src}"; do
+ for i in $extraSrcs; do
copy_kill_hash "$i" deps
done
+ '';
- ${if realGcc ==null then "" else
- ''export NIX_LDFLAGS="$NIX_LDFLAGS -L${realGcc}/lib -L${realGcc}/lib64 -lpcre -llapack -lm -lfftw3f -lfftw3 -lglpk -lunistring -lz -lgmp -lmpfr -lblas -lopenblas -L$out/lib"''}
- export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -fPIC "
-
- export LDFLAGS="-L${suitesparse}/lib -L$out/lib/julia -Wl,-rpath,$out/lib/julia"
-
- export GLPK_PREFIX="${glpk}/include"
-
- mkdir -p "$out/lib"
- sed -e "s@/usr/local/lib@$out/lib@g" -i deps/Makefile
- sed -e "s@/usr/lib@$out/lib@g" -i deps/Makefile
-
- export makeFlags="$makeFlags PREFIX=$out SHELL=${stdenv.shell} prefix=$out"
-
- export dontPatchELF=1
-
- export LD_LIBRARY_PATH="$LD_LIBRARY_PATH:$PWD/usr/lib:$PWD/usr/lib/julia"
+ postPatch = ''
+ sed -i deps/Makefile \
+ -e "s@/usr/local/lib@$out/lib@g" \
+ -e "s@/usr/lib@$out/lib@g" \
+ -e "s@/usr/include/double-conversion@${double_conversion}/include/double-conversion@g"
patchShebangs . contrib
- export PATH="$PATH:${stdenv.cc.libc}/sbin"
-
# ldconfig doesn't seem to ever work on NixOS; system-wide ldconfig cache
# is probably not what we want anyway on non-NixOS
sed -e "s@/sbin/ldconfig@true@" -i src/ccall.*
-
- ln -s "${openblas}/lib/libopenblas.so" "$out/lib/libblas.so"
'';
- preBuild = ''
- mkdir -p usr/lib
-
- echo "$out"
- mkdir -p "$out/lib"
- (
- cd "$(mktemp -d)"
- for i in "${suitesparse}"/lib/lib*.a; do
- ar -x $i
- done
- gcc *.o --shared -o "$out/lib/libsuitesparse.so"
- )
- cp "$out/lib/libsuitesparse.so" usr/lib
- for i in umfpack cholmod amd camd colamd spqr; do
- ln -s libsuitesparse.so "$out"/lib/lib$i.so;
- ln -s libsuitesparse.so "usr"/lib/lib$i.so;
- done
- '';
+ buildInputs =
+ [ libunwind llvm readline utf8proc zlib
+ double_conversion fftw fftwSinglePrec glpk gmp mpfr pcre
+ openblas arpack suitesparse
+ ];
+
+ nativeBuildInputs = [ gfortran git m4 patchelf perl which ];
+
+ makeFlags =
+ let
+ arch = head (splitString "-" stdenv.system);
+ march =
+ { "x86_64-linux" = "x86-64";
+ "x86_64-darwin" = "x86-64";
+ "i686-linux" = "i686";
+ }."${stdenv.system}" or (throw "unsupported system: ${stdenv.system}");
+ in [
+ "ARCH=${arch}"
+ "MARCH=${march}"
+ "JULIA_CPU_TARGET=${march}"
+ "PREFIX=$(out)"
+ "prefix=$(out)"
+ "SHELL=${stdenv.shell}"
+
+ "USE_SYSTEM_BLAS=1"
+ "LIBBLAS=-lopenblas"
+ "LIBBLASNAME=libopenblas"
+
+ "USE_SYSTEM_LAPACK=1"
+ "LIBLAPACK=-lopenblas"
+ "LIBLAPACKNAME=libopenblas"
+
+ "USE_SYSTEM_ARPACK=1"
+ "USE_SYSTEM_FFTW=1"
+ "USE_SYSTEM_GLPK=1"
+ "USE_SYSTEM_GMP=1"
+ "USE_SYSTEM_GRISU=1"
+ "USE_SYSTEM_LIBUNWIND=1"
+ "USE_SYSTEM_LLVM=1"
+ "USE_SYSTEM_MPFR=1"
+ "USE_SYSTEM_PATCHELF=1"
+ "USE_SYSTEM_PCRE=1"
+ "USE_SYSTEM_READLINE=1"
+ "USE_SYSTEM_SUITESPARSE=1"
+ "USE_SYSTEM_UTF8PROC=1"
+ "USE_SYSTEM_ZLIB=1"
+ ];
+
+ GLPK_PREFIX = "${glpk}/include";
+
+ NIX_CFLAGS_COMPILE = [ "-fPIC" ];
+
+ # Julia tries to load these libraries dynamically at runtime, but they can't be found.
+ # Easier by far to link against them as usual.
+ # These go in LDFLAGS, where they affect only Julia itself, and not NIX_LDFLAGS,
+ # where they would also be used for all the private libraries Julia builds.
+ LDFLAGS = [
+ "-larpack"
+ "-lfftw3_threads"
+ "-lfftw3f_threads"
+ "-lglpk"
+ "-lgmp"
+ "-lmpfr"
+ "-lopenblas"
+ "-lpcre"
+ "-lsuitesparse"
+ "-lz"
+ ];
dontStrip = true;
+ dontPatchELF = true;
enableParallelBuilding = true;
@@ -147,8 +139,8 @@ stdenv.mkDerivation rec {
description = "High-level performance-oriented dynamical language for technical computing";
homepage = "http://julialang.org/";
license = stdenv.lib.licenses.mit;
- maintainers = [ stdenv.lib.maintainers.raskin ];
- platforms = with stdenv.lib.platforms; linux;
+ maintainers = with stdenv.lib.maintainers; [ raskin ttuegel ];
+ platforms = [ "i686-linux" "x86_64-linux" "x86_64-darwin" ];
broken = false;
};
}
diff --git a/pkgs/development/compilers/julia/0001-work-around-buggy-wcwidth.patch b/pkgs/development/compilers/julia/0001-work-around-buggy-wcwidth.patch
new file mode 100644
index 00000000000..7c4870fb2a8
--- /dev/null
+++ b/pkgs/development/compilers/julia/0001-work-around-buggy-wcwidth.patch
@@ -0,0 +1,24 @@
+From b9070aeab0ab672ffe321089631f9afe263b0caa Mon Sep 17 00:00:00 2001
+From: Thomas Tuegel
+Date: Thu, 4 Jun 2015 12:03:32 -0500
+Subject: [PATCH] work around buggy wcwidth
+
+---
+ test/unicode.jl | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+diff --git a/test/unicode.jl b/test/unicode.jl
+index 52c3e6a..f1ef698 100644
+--- a/test/unicode.jl
++++ b/test/unicode.jl
+@@ -103,5 +103,6 @@ end
+
+ # handling of embedded NUL chars (#10958)
+ @test length("\0w") == length("\0α") == 2
+-@test strwidth("\0w") == strwidth("\0α") == 1
++@test strwidth("\0w") == charwidth('\0') + charwidth('w')
++@test strwidth("\0α") == charwidth('\0') + charwidth('α')
+ @test normalize_string("\0W", casefold=true) == "\0w"
+--
+2.4.1
+
diff --git a/pkgs/development/compilers/llvm/3.4/llvm.nix b/pkgs/development/compilers/llvm/3.4/llvm.nix
index d3beb2e7461..a44f157a13e 100644
--- a/pkgs/development/compilers/llvm/3.4/llvm.nix
+++ b/pkgs/development/compilers/llvm/3.4/llvm.nix
@@ -44,6 +44,7 @@ in stdenv.mkDerivation rec {
"-DCMAKE_BUILD_TYPE=Release"
"-DLLVM_BUILD_TESTS=ON"
"-DLLVM_ENABLE_FFI=ON"
+ "-DLLVM_REQUIRES_RTTI=1"
"-DLLVM_BINUTILS_INCDIR=${binutils}/include"
"-DCMAKE_CXX_FLAGS=-std=c++11"
] ++ stdenv.lib.optional (!isDarwin) "-DBUILD_SHARED_LIBS=ON";
diff --git a/pkgs/development/compilers/mono/default.nix b/pkgs/development/compilers/mono/default.nix
index ba2ce00cfb5..66939ff1a02 100644
--- a/pkgs/development/compilers/mono/default.nix
+++ b/pkgs/development/compilers/mono/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, bison, pkgconfig, glib, gettext, perl, libgdiplus, libX11, callPackage, ncurses, zlib, withLLVM ? true }:
+{ stdenv, fetchurl, bison, pkgconfig, glib, gettext, perl, libgdiplus, libX11, callPackage, ncurses, zlib, withLLVM ? false, cacert }:
let
llvm = callPackage ./llvm.nix { };
@@ -31,11 +31,16 @@ stdenv.mkDerivation rec {
# Parallel building doesn't work, as shows http://hydra.nixos.org/build/2983601
enableParallelBuilding = false;
+ # We want pkg-config to take priority over the dlls in the Mono framework and the GAC
+ # because we control pkg-config
+ patches = [ ./pkgconfig-before-gac.patch ];
+
# Patch all the necessary scripts. Also, if we're using LLVM, we fix the default
# LLVM path to point into the Mono LLVM build, since it's private anyway.
preBuild = ''
makeFlagsArray=(INSTALL=`type -tp install`)
patchShebangs ./
+ substituteInPlace mcs/class/corlib/System/Environment.cs --replace /usr/share "$out/share"
'' + stdenv.lib.optionalString withLLVM ''
substituteInPlace mono/mini/aot-compiler.c --replace "llvm_path = g_strdup (\"\")" "llvm_path = g_strdup (\"${llvm}/bin/\")"
'';
@@ -50,6 +55,14 @@ stdenv.mkDerivation rec {
done
'';
+ # Without this, any Mono application attempting to open an SSL connection will throw with
+ # The authentication or decryption has failed.
+ # ---> Mono.Security.Protocol.Tls.TlsException: Invalid certificate received from server.
+ postInstall = ''
+ echo "Updating Mono key store"
+ $out/bin/cert-sync ${cacert}/etc/ssl/certs/ca-bundle.crt
+ '';
+
meta = {
homepage = http://mono-project.com/;
description = "Cross platform, open source .NET development framework";
diff --git a/pkgs/development/compilers/mono/pkgconfig-before-gac.patch b/pkgs/development/compilers/mono/pkgconfig-before-gac.patch
new file mode 100644
index 00000000000..7632d850391
--- /dev/null
+++ b/pkgs/development/compilers/mono/pkgconfig-before-gac.patch
@@ -0,0 +1,65 @@
+diff -Naur mono-4.0.1.old/mcs/tools/xbuild/data/12.0/Microsoft.Common.targets mono-4.0.1/mcs/tools/xbuild/data/12.0/Microsoft.Common.targets
+--- mono-4.0.1.old/mcs/tools/xbuild/data/12.0/Microsoft.Common.targets 2015-04-24 02:26:18.000000000 +0100
++++ mono-4.0.1/mcs/tools/xbuild/data/12.0/Microsoft.Common.targets 2015-05-26 00:52:33.997847464 +0100
+@@ -229,8 +229,8 @@
+ $(ReferencePath);
+ @(AdditionalReferencePath);
+ {HintPathFromItem};
+- {TargetFrameworkDirectory};
+ {PkgConfig};
++ {TargetFrameworkDirectory};
+ {GAC};
+ {RawFileName};
+ $(OutDir)
+diff -Naur mono-4.0.1.old/mcs/tools/xbuild/data/14.0/Microsoft.Common.targets mono-4.0.1/mcs/tools/xbuild/data/14.0/Microsoft.Common.targets
+--- mono-4.0.1.old/mcs/tools/xbuild/data/14.0/Microsoft.Common.targets 2015-04-24 02:26:18.000000000 +0100
++++ mono-4.0.1/mcs/tools/xbuild/data/14.0/Microsoft.Common.targets 2015-05-26 00:52:41.832612748 +0100
+@@ -214,8 +214,8 @@
+ $(ReferencePath);
+ @(AdditionalReferencePath);
+ {HintPathFromItem};
+- {TargetFrameworkDirectory};
+ {PkgConfig};
++ {TargetFrameworkDirectory};
+ {GAC};
+ {RawFileName};
+ $(OutDir)
+diff -Naur mono-4.0.1.old/mcs/tools/xbuild/data/2.0/Microsoft.Common.targets mono-4.0.1/mcs/tools/xbuild/data/2.0/Microsoft.Common.targets
+--- mono-4.0.1.old/mcs/tools/xbuild/data/2.0/Microsoft.Common.targets 2015-04-24 02:26:18.000000000 +0100
++++ mono-4.0.1/mcs/tools/xbuild/data/2.0/Microsoft.Common.targets 2015-05-26 00:52:46.298478961 +0100
+@@ -139,8 +139,8 @@
+ $(ReferencePath);
+ @(AdditionalReferencePath);
+ {HintPathFromItem};
+- {TargetFrameworkDirectory};
+ {PkgConfig};
++ {TargetFrameworkDirectory};
+ {GAC};
+ {RawFileName};
+ $(OutDir)
+diff -Naur mono-4.0.1.old/mcs/tools/xbuild/data/3.5/Microsoft.Common.targets mono-4.0.1/mcs/tools/xbuild/data/3.5/Microsoft.Common.targets
+--- mono-4.0.1.old/mcs/tools/xbuild/data/3.5/Microsoft.Common.targets 2015-04-24 02:26:18.000000000 +0100
++++ mono-4.0.1/mcs/tools/xbuild/data/3.5/Microsoft.Common.targets 2015-05-26 00:52:52.119304583 +0100
+@@ -167,8 +167,8 @@
+ $(ReferencePath);
+ @(AdditionalReferencePath);
+ {HintPathFromItem};
+- {TargetFrameworkDirectory};
+ {PkgConfig};
++ {TargetFrameworkDirectory};
+ {GAC};
+ {RawFileName};
+ $(OutDir)
+diff -Naur mono-4.0.1.old/mcs/tools/xbuild/data/4.0/Microsoft.Common.targets mono-4.0.1/mcs/tools/xbuild/data/4.0/Microsoft.Common.targets
+--- mono-4.0.1.old/mcs/tools/xbuild/data/4.0/Microsoft.Common.targets 2015-04-24 02:26:18.000000000 +0100
++++ mono-4.0.1/mcs/tools/xbuild/data/4.0/Microsoft.Common.targets 2015-05-26 00:52:56.519172776 +0100
+@@ -229,8 +229,8 @@
+ $(ReferencePath);
+ @(AdditionalReferencePath);
+ {HintPathFromItem};
+- {TargetFrameworkDirectory};
+ {PkgConfig};
++ {TargetFrameworkDirectory};
+ {GAC};
+ {RawFileName};
+ $(OutDir)
diff --git a/pkgs/development/compilers/openjdk/bootstrap.nix b/pkgs/development/compilers/openjdk/bootstrap.nix
index 890064538cc..a9ca7673dfe 100644
--- a/pkgs/development/compilers/openjdk/bootstrap.nix
+++ b/pkgs/development/compilers/openjdk/bootstrap.nix
@@ -1,33 +1,60 @@
-{ stdenv, runCommand, glibc, fetchurl, file }:
+{ stdenv, runCommand, glibc, fetchurl, file
+
+, version
+}:
let
# !!! These should be on nixos.org
src = if glibc.system == "x86_64-linux" then
- fetchurl {
- url = http://tarballs.nixos.org/openjdk-bootstrap-x86_64-linux-2012-08-24.tar.xz;
- sha256 = "0gla9dxrfq2w1hvgsnn8jg8a60k27im6z43a6iidi0qmwa0wah32";
- }
+ (if version == "8" then
+ fetchurl {
+ url = "https://www.dropbox.com/s/a0lsq2ig4uguky5/openjdk8-bootstrap-x86_64-linux.tar.xz?dl=1";
+ sha256 = "18zqx6jhm3lizn9hh6ryyqc9dz3i96pwaz8f6nxfllk70qi5gvks";
+ }
+ else if version == "7" then
+ fetchurl {
+ url = "https://www.dropbox.com/s/rssfbeommrfbsjf/openjdk7-bootstrap-x86_64-linux.tar.xz?dl=1";
+ sha256 = "024gg2sgg4labxbc1nhn8lxls2p7d9h3b82hnsahwaja2pm1hbra";
+ }
+ else throw "No bootstrap for version")
else if glibc.system == "i686-linux" then
- fetchurl {
- url = http://tarballs.nixos.org/openjdk-bootstrap-i686-linux-2012-08-24.tar.xz;
- sha256 = "184wq212bycwbbq4ix8cc6jwjxkrqw9b01zb86q95kqpa8zy5206";
- }
+ (if version == "8" then
+ fetchurl {
+ url = "https://www.dropbox.com/s/rneqjhlerijsw74/openjdk8-bootstrap-i686-linux.tar.xz?dl=1";
+ sha256 = "1yx04xh8bqz7amg12d13rw5vwa008rav59mxjw1b9s6ynkvfgqq9";
+ }
+ else if version == "7" then
+ fetchurl {
+ url = "https://www.dropbox.com/s/6xe64td7eg2wurs/openjdk7-bootstrap-i686-linux.tar.xz?dl=1";
+ sha256 = "0xwqjk1zx8akziw8q9sbjc1rs8s7c0w6mw67jdmmi26cwwp8ijnx";
+ }
+ else throw "No bootstrap for version")
else throw "No bootstrap for system";
-in
-runCommand "openjdk-bootstrap" {} ''
- tar xvf ${src}
- mv openjdk-bootstrap $out
+ bootstrap = runCommand "openjdk-bootstrap" {
+ passthru.home = "${bootstrap}/lib/openjdk";
+ } ''
+ tar xvf ${src}
+ mv openjdk-bootstrap $out
- for i in $out/bin/*; do
- patchelf --set-interpreter ${glibc}/lib/ld-linux*.so.2 $i
- done
+ LIBDIRS="$(find $out -name \*.so\* -exec dirname {} \; | sort | uniq | tr '\n' ':')"
- # Temporarily, while NixOS's OpenJDK bootstrap tarball doesn't have PaX markings:
- exes=$(${file}/bin/file $out/bin/* 2> /dev/null | grep -E 'ELF.*(executable|shared object)' | sed -e 's/: .*$//')
- for file in $exes; do
- paxmark m "$file"
- # On x86 for heap sizes over 700MB disable SEGMEXEC and PAGEEXEC as well.
- ${stdenv.lib.optionalString stdenv.isi686 ''paxmark msp "$file"''}
- done
-''
+ for i in $out/bin/*; do
+ patchelf --set-interpreter ${glibc}/lib/ld-linux*.so.2 $i || true
+ patchelf --set-rpath "${glibc}/lib:$LIBDIRS" $i || true
+ done
+
+ find $out -name \*.so\* | while read lib; do
+ patchelf --set-interpreter ${glibc}/lib/ld-linux*.so.2 $lib || true
+ patchelf --set-rpath "${glibc}/lib:${stdenv.cc.cc}/lib:$LIBDIRS" $lib || true
+ done
+
+ # Temporarily, while NixOS's OpenJDK bootstrap tarball doesn't have PaX markings:
+ exes=$(${file}/bin/file $out/bin/* 2> /dev/null | grep -E 'ELF.*(executable|shared object)' | sed -e 's/: .*$//')
+ for file in $exes; do
+ paxmark m "$file"
+ # On x86 for heap sizes over 700MB disable SEGMEXEC and PAGEEXEC as well.
+ ${stdenv.lib.optionalString stdenv.isi686 ''paxmark msp "$file"''}
+ done
+ '';
+in bootstrap
diff --git a/pkgs/development/compilers/openjdk/default.nix b/pkgs/development/compilers/openjdk/default.nix
index d0ca85af0e0..be4ca84bd8d 100644
--- a/pkgs/development/compilers/openjdk/default.nix
+++ b/pkgs/development/compilers/openjdk/default.nix
@@ -1,6 +1,8 @@
{ stdenv, fetchurl, unzip, zip, procps, coreutils, alsaLib, ant, freetype
-, which, jdk, nettools, xorg, file
-, fontconfig, cpio, cacert, perl, setJavaClassPath }:
+, which, bootjdk, nettools, xorg, file
+, fontconfig, cpio, cacert, perl, setJavaClassPath
+, minimal ? false
+}:
let
@@ -15,7 +17,7 @@ let
else
throw "openjdk requires i686-linux or x86_64 linux";
- update = "65";
+ update = "80";
build = "32";
@@ -27,13 +29,41 @@ let
md5 = "de3006e5cf1ee78a9c6145ce62c4e982";
};
+ baseurl = "http://hg.openjdk.java.net/jdk7u/jdk7u";
+ repover = "jdk7u${update}-b${build}";
+ jdk7 = fetchurl {
+ url = "${baseurl}/archive/${repover}.tar.gz";
+ sha256 = "1r8xnn87nmqaq2f8i3cp3i9ngq66k0c0wgkdq5cf59lkgs8wkcdi";
+ };
+ langtools = fetchurl {
+ url = "${baseurl}/langtools/archive/${repover}.tar.gz";
+ sha256 = "01alj6pfrjqyf4irll9wg34h4w9nmb3973lvbacs528qm1nxgh9r";
+ };
+ hotspot = fetchurl {
+ url = "${baseurl}/hotspot/archive/${repover}.tar.gz";
+ sha256 = "14zla8axmg5344zf45i4cj7yyli0kmdjsh9yalmzqaphpkqjqpf2";
+ };
+ corba = fetchurl {
+ url = "${baseurl}/corba/archive/${repover}.tar.gz";
+ sha256 = "19z3ay3f2q7r2ra03c6wy8b5rbdbrkq5g2dzhrqcg0n4iydd3c40";
+ };
+ jdk = fetchurl {
+ url = "${baseurl}/jdk/archive/${repover}.tar.gz";
+ sha256 = "1q0r2l9bz2cyx4fq79x6cb2f5xycw83hl5cn1d1mazgsckp590lb";
+ };
+ jaxws = fetchurl {
+ url = "${baseurl}/jaxws/archive/${repover}.tar.gz";
+ sha256 = "1lp0mww2x3b6xavb7idrzckh6iw8jd6s1fvqgfvzs853z4ifksqj";
+ };
+ jaxp = fetchurl {
+ url = "${baseurl}/jaxp/archive/${repover}.tar.gz";
+ sha256 = "0pd874dkgxkb7frxg4n9py61kkhhck4x33dcynynwb3vl6k6iy79";
+ };
openjdk = stdenv.mkDerivation rec {
name = "openjdk-7u${update}b${build}";
- src = fetchurl {
- url = "http://tarballs.nixos.org/openjdk-7u${update}-b${build}.tar.xz";
- sha256 = "0lyp75sl5w4b9azphb2nq5cwzli85inpksq4943q4j349rkmdprx";
- };
+ srcs = [ jdk7 langtools hotspot corba jdk jaxws jaxp ];
+ sourceRoot = ".";
outputs = [ "out" "jre" ];
@@ -41,18 +71,23 @@ let
[ unzip procps ant which zip cpio nettools alsaLib
xorg.libX11 xorg.libXt xorg.libXext xorg.libXrender xorg.libXtst
xorg.libXi xorg.libXinerama xorg.libXcursor xorg.lndir
- fontconfig perl file
+ fontconfig perl file bootjdk
];
- NIX_LDFLAGS = "-lfontconfig -lXcursor -lXinerama";
+ NIX_LDFLAGS = if minimal then null else "-lfontconfig -lXcursor -lXinerama";
postUnpack = ''
+ ls | grep jdk | grep -v '^jdk7u' | awk -F- '{print $1}' | while read p; do
+ mv $p-* $(ls | grep '^jdk7u')/$p
+ done
+ cd jdk7u-*
+
sed -i -e "s@/usr/bin/test@${coreutils}/bin/test@" \
-e "s@/bin/ls@${coreutils}/bin/ls@" \
- openjdk*/hotspot/make/linux/makefiles/sa.make
+ hotspot/make/linux/makefiles/sa.make
sed -i "s@/bin/echo -e@${coreutils}/bin/echo -e@" \
- openjdk*/{jdk,corba}/make/common/shared/Defs-utils.gmk
+ {jdk,corba}/make/common/shared/Defs-utils.gmk
tar xf ${cupsSrc}
cupsDir=$(echo $(pwd)/cups-*)
@@ -75,17 +110,17 @@ let
"ALSA_INCLUDE=${alsaLib}/include/alsa/version.h"
"FREETYPE_HEADERS_PATH=${freetype}/include"
"FREETYPE_LIB_PATH=${freetype}/lib"
- "MILESTONE=u${update}"
+ "MILESTONE=${update}"
"BUILD_NUMBER=b${build}"
"USRBIN_PATH="
"COMPILER_PATH="
"DEVTOOLS_PATH="
"UNIXCOMMAND_PATH="
- "BOOTDIR=${jdk}"
+ "BOOTDIR=${bootjdk.home}"
"STATIC_CXX=false"
"UNLIMITED_CRYPTO=1"
"FULL_DEBUG_SYMBOLS=0"
- ];
+ ] ++ stdenv.lib.optional minimal "BUILD_HEADLESS=1";
configurePhase = "true";
@@ -142,7 +177,7 @@ let
# Generate certificates.
pushd $jre/lib/openjdk/jre/lib/security
rm cacerts
- perl ${./generate-cacerts.pl} $jre/lib/openjdk/jre/bin/keytool ${cacert}/ca-bundle.crt
+ perl ${./generate-cacerts.pl} $jre/lib/openjdk/jre/bin/keytool ${cacert}/etc/ssl/certs/ca-bundle.crt
popd
ln -s $out/lib/openjdk/bin $out/bin
@@ -168,6 +203,32 @@ let
EOF
'';
+ postFixup = ''
+ # Build the set of output library directories to rpath against
+ LIBDIRS=""
+ for output in $outputs; do
+ LIBDIRS="$(find $(eval echo \$$output) -name \*.so\* -exec dirname {} \; | sort | uniq | tr '\n' ':'):$LIBDIRS"
+ done
+
+ # Add the local library paths to remove dependencies on the bootstrap
+ for output in $outputs; do
+ OUTPUTDIR="$(eval echo \$$output)"
+ BINLIBS="$(find $OUTPUTDIR/bin/ -type f; find $OUTPUTDIR -name \*.so\*)"
+ echo "$BINLIBS" | while read i; do
+ patchelf --set-rpath "$LIBDIRS:$(patchelf --print-rpath "$i")" "$i" || true
+ patchelf --shrink-rpath "$i" || true
+ done
+ done
+
+ # Test to make sure that we don't depend on the bootstrap
+ for output in $outputs; do
+ if grep -q -r '${bootjdk}' $(eval echo \$$output); then
+ echo "Extraneous references to ${bootjdk} detected"
+ exit 1
+ fi
+ done
+ '';
+
meta = {
homepage = http://openjdk.java.net/;
license = stdenv.lib.licenses.gpl2;
diff --git a/pkgs/development/compilers/openjdk/make-bootstrap.nix b/pkgs/development/compilers/openjdk/make-bootstrap.nix
index 090a1479741..aac54417e2a 100644
--- a/pkgs/development/compilers/openjdk/make-bootstrap.nix
+++ b/pkgs/development/compilers/openjdk/make-bootstrap.nix
@@ -1,26 +1,31 @@
{ runCommand, openjdk, nukeReferences }:
-let arch = openjdk.architecture; in
-
runCommand "${openjdk.name}-bootstrap.tar.xz" {} ''
- mkdir -p openjdk-bootstrap/bin
- mkdir -p openjdk-bootstrap/lib
- mkdir -p openjdk-bootstrap/jre/lib/{security,ext,${arch}/{jli,server,client,headless}}
- cp ${openjdk}/bin/{idlj,ja{va{,c,p,h},r},rmic} openjdk-bootstrap/bin
- cp ${openjdk}/lib/tools.jar openjdk-bootstrap/lib
- cp ${openjdk}/jre/lib/{meta-index,{charsets,jce,jsse,rt,resources}.jar,currency.data} openjdk-bootstrap/jre/lib
- cp ${openjdk}/jre/lib/security/java.security openjdk-bootstrap/jre/lib/security
- cp ${openjdk}/jre/lib/ext/{meta-index,sunjce_provider.jar} openjdk-bootstrap/jre/lib/ext
- cp ${openjdk}/jre/lib/${arch}/{jvm.cfg,lib{awt,java,verify,zip,nio,net}.so} openjdk-bootstrap/jre/lib/${arch}
- cp ${openjdk}/jre/lib/${arch}/jli/libjli.so openjdk-bootstrap/jre/lib/${arch}/jli
- cp ${openjdk}/jre/lib/${arch}/server/libjvm.so openjdk-bootstrap/jre/lib/${arch}/server
- cp ${openjdk}/jre/lib/${arch}/client/libjvm.so openjdk-bootstrap/jre/lib/${arch}/client ||
- rmdir openjdk-bootstrap/jre/lib/${arch}/client
- cp ${openjdk}/jre/lib/${arch}/headless/libmawt.so openjdk-bootstrap/jre/lib/${arch}/headless
- cp -a ${openjdk}/include openjdk-bootstrap
+ mkdir -pv openjdk-bootstrap/lib
+
+ # Do a deep copy of the openjdk
+ cp -vrL ${openjdk.home} openjdk-bootstrap/lib
+
+ # Includes are needed for building the native jvm
+ cp -vrL ${openjdk}/include openjdk-bootstrap
+
+ # The binaries are actually stored in the openjdk lib
+ ln -sv lib/openjdk/bin openjdk-bootstrap/bin
+ find . -name libjli.so
+ (cd openjdk-bootstrap/lib; find . -name libjli.so -exec ln -sfv {} libjli.so \;)
chmod -R +w openjdk-bootstrap
+
+ # Remove components we don't need
+ find openjdk-bootstrap -name \*.diz -exec rm {} \;
+ find openjdk-bootstrap -name \*.ttf -exec rm {} \;
+ find openjdk-bootstrap -name \*.gif -exec rm {} \;
+ find openjdk-bootstrap -name src.zip -exec rm {} \;
+ rm -rf openjdk-bootstrap/lib/openjdk/jre/bin
+
+ # Remove all of the references to the native nix store
find openjdk-bootstrap -print0 | xargs -0 ${nukeReferences}/bin/nuke-refs
+ # Create the output tarball
tar cv openjdk-bootstrap | xz > $out
''
diff --git a/pkgs/development/compilers/openjdk/openjdk8.nix b/pkgs/development/compilers/openjdk/openjdk8.nix
index c2780866161..530391c8e7d 100644
--- a/pkgs/development/compilers/openjdk/openjdk8.nix
+++ b/pkgs/development/compilers/openjdk/openjdk8.nix
@@ -1,4 +1,7 @@
-{ stdenv, fetchurl, cpio, file, which, unzip, zip, xorg, cups, freetype, alsaLib, openjdk, cacert, perl, liberation_ttf, fontconfig } :
+{ stdenv, fetchurl, cpio, file, which, unzip, zip, xorg, cups, freetype
+, alsaLib, bootjdk, cacert, perl, liberation_ttf, fontconfig, zlib
+
+, minimal ? false } :
let
update = "40";
build = "27";
@@ -38,119 +41,149 @@ let
sha256 = "1llf3l4483kd8m1a77n7y9fgvm6fa63nim3qhp5z4gnw68ldbhra";
};
openjdk8 = stdenv.mkDerivation {
- name = "openjdk-8u${update}b${build}";
- srcs = [ jdk8 langtools hotspot corba jdk jaxws jaxp nashorn ];
- outputs = [ "out" "jre" ];
- buildInputs = [ cpio file which unzip zip
- xorg.libX11 xorg.libXt xorg.libXext xorg.libXrender xorg.libXtst
- xorg.libXi xorg.libXinerama xorg.libXcursor xorg.lndir
- cups freetype alsaLib openjdk perl liberation_ttf fontconfig ];
- setSourceRoot = ''
- sourceRoot="jdk8u${update}-jdk8u${update}-b${build}";
- '';
- prePatch = ''
- # despite --with-override-jdk the build still searchs here
- # GNU Patch bug, --follow-symlinks only follow the last dir part symlink
- mv "../jdk-${repover}" "jdk";
- mv "../hotspot-${repover}" "hotspot";
- '';
- postPatch = ''
- mv jdk "../jdk-${repover}";
- mv hotspot "../hotspot-${repover}";
- # Patching is over, lets re-add the links
- ln -s "../jdk-${repover}" "jdk"
- ln -s "../hotspot-${repover}" "hotspot"
- '';
- patches = [
- ./fix-java-home-jdk8.patch
- ./read-truststore-from-env-jdk8.patch
- ./currency-date-range-jdk8.patch
- ./JDK-8074312-hotspot.patch
+ name = "openjdk-8u${update}b${build}";
- ];
- preConfigure = ''
- chmod +x configure
- substituteInPlace configure --replace /bin/bash "$shell"
- substituteInPlace ../hotspot-${repover}/make/linux/adlc_updater --replace /bin/sh "$shell"
- '';
- configureFlags = [
- "--with-freetype=${freetype}"
- "--with-override-langtools=../langtools-${repover}"
- "--with-override-hotspot=../hotspot-${repover}"
- "--with-override-corba=../corba-${repover}"
- "--with-override-jdk=../jdk-${repover}"
- "--with-override-jaxws=../jaxws-${repover}"
- "--with-override-jaxp=../jaxp-${repover}"
- "--with-override-nashorn=../nashorn-${repover}"
- "--with-boot-jdk=${openjdk}/lib/openjdk/"
- "--with-update-version=${update}"
- "--with-build-number=b${build}"
- "--with-milestone=fcs"
- ];
- NIX_LDFLAGS= "-lfontconfig";
- buildFlags = "all";
- installPhase = ''
- mkdir -p $out/lib/openjdk $out/share $jre/lib/openjdk
+ srcs = [ jdk8 langtools hotspot corba jdk jaxws jaxp nashorn ];
+ sourceRoot = ".";
- cp -av build"/"*/images/j2sdk-image"/"* $out/lib/openjdk
+ outputs = [ "out" "jre" ];
- # Move some stuff to top-level.
- mv $out/lib/openjdk/include $out/include
- mv $out/lib/openjdk/man $out/share/man
+ buildInputs = [
+ cpio file which unzip zip
+ xorg.libX11 xorg.libXt xorg.libXext xorg.libXrender xorg.libXtst
+ xorg.libXi xorg.libXinerama xorg.libXcursor xorg.lndir
+ cups freetype alsaLib perl liberation_ttf fontconfig bootjdk zlib
+ ];
- # jni.h expects jni_md.h to be in the header search path.
- ln -s $out/include/linux"/"*_md.h $out/include/
+ prePatch = ''
+ ls | grep jdk | grep -v '^jdk8u' | awk -F- '{print $1}' | while read p; do
+ mv $p-* $(ls | grep '^jdk8u')/$p
+ done
+ cd $(ls | grep '^jdk8u')
+ '';
- # Remove some broken manpages.
- rm -rf $out/share/man/ja*
+ patches = [
+ ./fix-java-home-jdk8.patch
+ ./read-truststore-from-env-jdk8.patch
+ ./currency-date-range-jdk8.patch
+ ./JDK-8074312-hotspot.patch
+ ];
- # Remove crap from the installation.
- rm -rf $out/lib/openjdk/demo $out/lib/openjdk/sample
+ preConfigure = ''
+ chmod +x configure
+ substituteInPlace configure --replace /bin/bash "$shell"
+ substituteInPlace hotspot/make/linux/adlc_updater --replace /bin/sh "$shell"
+ '';
- # Move the JRE to a separate output and setup fallback fonts
- mv $out/lib/openjdk/jre $jre/lib/openjdk/
- mkdir $out/lib/openjdk/jre
- mkdir -p $jre/lib/openjdk/jre/lib/fonts/fallback
- lndir ${liberation_ttf}/share/fonts/truetype $jre/lib/openjdk/jre/lib/fonts/fallback
- lndir $jre/lib/openjdk/jre $out/lib/openjdk/jre
+ configureFlags = [
+ "--with-freetype=${freetype}"
+ "--with-boot-jdk=${bootjdk.home}"
+ "--with-update-version=${update}"
+ "--with-build-number=${build}"
+ "--with-milestone=fcs"
+ "--enable-unlimited-crypto"
+ "--disable-debug-symbols"
+ "--disable-freetype-bundling"
+ ] ++ (if minimal then [
+ "--disable-headful"
+ "--with-zlib=bundled"
+ "--with-giflib=bundled"
+ ] else [
+ "--with-zlib=system"
+ ]);
- rm -rf $out/lib/openjdk/jre/bina
- ln -s $out/lib/openjdk/bin $out/lib/openjdk/jre/bin
+ NIX_LDFLAGS= if minimal then null else "-lfontconfig";
- # Set PaX markings
- exes=$(file $out/lib/openjdk/bin"/"* $jre/lib/openjdk/jre/bin"/"* 2> /dev/null | grep -E 'ELF.*(executable|shared object)' | sed -e 's/: .*$//')
- echo "to mark: *$exes*"
- for file in $exes; do
- echo "marking *$file*"
- paxmark ${paxflags} "$file"
- done
+ buildFlags = "all";
- # Remove duplicate binaries.
- for i in $(cd $out/lib/openjdk/bin && echo *); do
- if [ "$i" = java ]; then continue; fi
- if cmp -s $out/lib/openjdk/bin/$i $jre/lib/openjdk/jre/bin/$i; then
- ln -sfn $jre/lib/openjdk/jre/bin/$i $out/lib/openjdk/bin/$i
- fi
- done
+ installPhase = ''
+ mkdir -p $out/lib/openjdk $out/share $jre/lib/openjdk
- # Generate certificates.
- pushd $jre/lib/openjdk/jre/lib/security
- rm cacerts
- perl ${./generate-cacerts.pl} $jre/lib/openjdk/jre/bin/keytool ${cacert}/ca-bundle.crt
- popd
+ cp -av build"/"*/images/j2sdk-image"/"* $out/lib/openjdk
- ln -s $out/lib/openjdk/bin $out/bin
- ln -s $jre/lib/openjdk/jre/bin $jre/bin
+ # Move some stuff to top-level.
+ mv $out/lib/openjdk/include $out/include
+ mv $out/lib/openjdk/man $out/share/man
- '';
+ # jni.h expects jni_md.h to be in the header search path.
+ ln -s $out/include/linux"/"*_md.h $out/include/
- meta = with stdenv.lib; {
- homepage = http://openjdk.java.net/;
- license = licenses.gpl2;
- description = "The open-source Java Development Kit";
- maintainers = with maintainers; [ edwtjo ];
- platforms = platforms.linux;
+ # Remove some broken manpages.
+ rm -rf $out/share/man/ja*
+
+ # Remove crap from the installation.
+ rm -rf $out/lib/openjdk/demo $out/lib/openjdk/sample
+
+ # Move the JRE to a separate output and setup fallback fonts
+ mv $out/lib/openjdk/jre $jre/lib/openjdk/
+ mkdir $out/lib/openjdk/jre
+ mkdir -p $jre/lib/openjdk/jre/lib/fonts/fallback
+ lndir ${liberation_ttf}/share/fonts/truetype $jre/lib/openjdk/jre/lib/fonts/fallback
+ lndir $jre/lib/openjdk/jre $out/lib/openjdk/jre
+
+ rm -rf $out/lib/openjdk/jre/bina
+ ln -s $out/lib/openjdk/bin $out/lib/openjdk/jre/bin
+
+ # Set PaX markings
+ exes=$(file $out/lib/openjdk/bin"/"* $jre/lib/openjdk/jre/bin"/"* 2> /dev/null | grep -E 'ELF.*(executable|shared object)' | sed -e 's/: .*$//')
+ echo "to mark: *$exes*"
+ for file in $exes; do
+ echo "marking *$file*"
+ paxmark ${paxflags} "$file"
+ done
+
+ # Remove duplicate binaries.
+ for i in $(cd $out/lib/openjdk/bin && echo *); do
+ if [ "$i" = java ]; then continue; fi
+ if cmp -s $out/lib/openjdk/bin/$i $jre/lib/openjdk/jre/bin/$i; then
+ ln -sfn $jre/lib/openjdk/jre/bin/$i $out/lib/openjdk/bin/$i
+ fi
+ done
+
+ # Generate certificates.
+ pushd $jre/lib/openjdk/jre/lib/security
+ rm cacerts
+ perl ${./generate-cacerts.pl} $jre/lib/openjdk/jre/bin/keytool ${cacert}/etc/ssl/certs/ca-bundle.crt
+ popd
+
+ ln -s $out/lib/openjdk/bin $out/bin
+ ln -s $jre/lib/openjdk/jre/bin $jre/bin
+ '';
+
+ postFixup = ''
+ # Build the set of output library directories to rpath against
+ LIBDIRS=""
+ for output in $outputs; do
+ LIBDIRS="$(find $(eval echo \$$output) -name \*.so\* -exec dirname {} \; | sort | uniq | tr '\n' ':'):$LIBDIRS"
+ done
+
+ # Add the local library paths to remove dependencies on the bootstrap
+ for output in $outputs; do
+ OUTPUTDIR="$(eval echo \$$output)"
+ BINLIBS="$(find $OUTPUTDIR/bin/ -type f; find $OUTPUTDIR -name \*.so\*)"
+ echo "$BINLIBS" | while read i; do
+ patchelf --set-rpath "$LIBDIRS:$(patchelf --print-rpath "$i")" "$i" || true
+ patchelf --shrink-rpath "$i" || true
+ done
+ done
+
+ # Test to make sure that we don't depend on the bootstrap
+ for output in $outputs; do
+ if grep -q -r '${bootjdk}' $(eval echo \$$output); then
+ echo "Extraneous references to ${bootjdk} detected"
+ exit 1
+ fi
+ done
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = http://openjdk.java.net/;
+ license = licenses.gpl2;
+ description = "The open-source Java Development Kit";
+ maintainers = with maintainers; [ edwtjo ];
+ platforms = platforms.linux;
+ };
+
+ passthru.home = "${openjdk8}/lib/openjdk";
};
-
- passthru.home = "${openjdk8}/lib/openjdk";
-}; in openjdk8
+in openjdk8
diff --git a/pkgs/development/compilers/uhc/default.nix b/pkgs/development/compilers/uhc/default.nix
index c788112fb91..1dbfb039f90 100644
--- a/pkgs/development/compilers/uhc/default.nix
+++ b/pkgs/development/compilers/uhc/default.nix
@@ -2,13 +2,17 @@
let wrappedGhc = ghcWithPackages (hpkgs: with hpkgs; [shuffle hashable mtl network uhc-util uulib] );
in stdenv.mkDerivation rec {
- version = "1.1.9.0";
+ # Important:
+ # The commits "Fixate/tag v..." are the released versions.
+ # Ignore the "bumped version to ...." commits, they do not
+ # correspond to releases.
+ version = "1.1.9.1.20150611";
name = "uhc-${version}";
src = fetchgit {
url = "https://github.com/UU-ComputerScience/uhc.git";
- rev = "0363bbcf4cf8c47d30c3a188e3e53b3f8454bbe4";
- sha256 = "0sa9b341mm5ggmbydc33ja3h7k9w65qnki9gsaagb06gkvvqc7c2";
+ rev = "b80098e07d12900f098ea964b1d2b3f38e5c9900";
+ sha256 = "14qg1fd9pgbczcmn5ggkd9674qadx1izmz8363ps7c207dg94f9x";
};
postUnpack = "sourceRoot=\${sourceRoot}/EHC";
diff --git a/pkgs/development/coq-modules/fiat/default.nix b/pkgs/development/coq-modules/fiat/default.nix
index 92b69319e0b..df4ea133cd9 100644
--- a/pkgs/development/coq-modules/fiat/default.nix
+++ b/pkgs/development/coq-modules/fiat/default.nix
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
buildInputs = [ coq.ocaml coq.camlp5 ];
propagatedBuildInputs = [ coq ];
- enableParallelBuilding = true;
+ enableParallelBuilding = false;
doCheck = true;
unpackPhase = ''
diff --git a/pkgs/development/dotnet-modules/patches/monodevelop-fsharpbinding.addin-xml.patch b/pkgs/development/dotnet-modules/patches/monodevelop-fsharpbinding.addin-xml.patch
new file mode 100644
index 00000000000..a3b2f87f378
--- /dev/null
+++ b/pkgs/development/dotnet-modules/patches/monodevelop-fsharpbinding.addin-xml.patch
@@ -0,0 +1,88 @@
+--- fsharpbinding-a09c818/monodevelop/MonoDevelop.FSharpBinding/FSharpBinding.addin.xml.orig.old 2015-06-03 19:53:00.116849746 +0100
++++ fsharpbinding-a09c818/monodevelop/MonoDevelop.FSharpBinding/FSharpBinding.addin.xml.orig 2015-06-03 19:56:30.112579384 +0100
+@@ -130,6 +130,11 @@
+
+
+
++
++
++
++
++
+
+
+
+@@ -182,14 +187,7 @@
+
+
+
+-
+-
+-
+-
+-
+
+-
+-
+
+
+
+@@ -267,13 +265,7 @@
+
+
+
+-
+-
+-
+-
+-
+
+-
+
+
+
+@@ -281,11 +273,6 @@
+
+
+
+-
+-
+-
+-
+-
+
+
+
+-
+
+
+
+-
+-
+-
+-
+-
+
+
+
+
+-
+
+
+
+-
+-
+-
+-
+-
+
+
+
+-
+
+
+
diff --git a/pkgs/development/dotnet-modules/patches/monodevelop-fsharpbinding.references.patch b/pkgs/development/dotnet-modules/patches/monodevelop-fsharpbinding.references.patch
new file mode 100644
index 00000000000..e53482e0c00
--- /dev/null
+++ b/pkgs/development/dotnet-modules/patches/monodevelop-fsharpbinding.references.patch
@@ -0,0 +1,43 @@
+--- fsharpbinding-a09c818/monodevelop/MonoDevelop.FSharpBinding/MonoDevelop.FSharp.fsproj.orig.old 2015-06-03 18:48:55.345385084 +0100
++++ fsharpbinding-a09c818/monodevelop/MonoDevelop.FSharpBinding/MonoDevelop.FSharp.fsproj.orig 2015-06-03 19:00:11.453399028 +0100
+@@ -185,19 +185,19 @@
+ False
+ INSERT_FSPROJ_MDROOT\AddIns\NUnit\MonoDevelop.NUnit.dll
+
+-
+- {88F6940F-D300-474C-B2A7-E2ECD5B04B57}
+- FSharp.CompilerBinding
+-
++
++ True
++
+
+ {FD0D1033-9145-48E5-8ED8-E2365252878C}
+ MonoDevelop.FSharp.Gui
+
+-
++
+ True
+
+
+ packages\FSharp.Compiler.Service.0.0.85\lib\net45\FSharp.Compiler.Service.dll
++ True
+
+
+ packages\Mono.Cecil.0.9.5.4\lib\net40\Mono.Cecil.dll
+@@ -213,12 +213,15 @@
+
+
+ packages\Fantomas.1.6.0\lib\FantomasLib.dll
++ True
+
+
+ packages\FSharp.Compiler.CodeDom.0.9.1\lib\net40\FSharp.Compiler.CodeDom.dll
++ True
+
+
+ packages\ExtCore.0.8.45\lib\net40\ExtCore.dll
++ True
+
+
+
diff --git a/pkgs/development/dotnet-modules/patches/newtonsoft-json.references.patch b/pkgs/development/dotnet-modules/patches/newtonsoft-json.references.patch
new file mode 100644
index 00000000000..ed9b7adbef2
--- /dev/null
+++ b/pkgs/development/dotnet-modules/patches/newtonsoft-json.references.patch
@@ -0,0 +1,11 @@
+--- Newtonsoft.Json-6.0.8/Src/Newtonsoft.Json.Tests/Newtonsoft.Json.Tests.csproj.old 2015-01-11 06:46:39.000000000 +0000
++++ Newtonsoft.Json-6.0.8/Src/Newtonsoft.Json.Tests/Newtonsoft.Json.Tests.csproj 2015-05-25 21:29:40.546808622 +0100
+@@ -52,6 +52,8 @@
+
+
+
++
++
+
+
+
diff --git a/pkgs/development/haskell-modules/configuration-common.nix b/pkgs/development/haskell-modules/configuration-common.nix
index 9a4979cd58d..d42c05fad28 100644
--- a/pkgs/development/haskell-modules/configuration-common.nix
+++ b/pkgs/development/haskell-modules/configuration-common.nix
@@ -119,6 +119,22 @@ self: super: {
# Help libconfig find it's C language counterpart.
libconfig = (dontCheck super.libconfig).override { config = pkgs.libconfig; };
+ hmatrix = overrideCabal super.hmatrix (drv: {
+ configureFlags = (drv.configureFlags or []) ++ [ "-fopenblas" ];
+ extraLibraries = [ pkgs.openblasCompat ];
+ preConfigure = ''
+ sed -i hmatrix.cabal -e 's@/usr/lib/openblas/lib@${pkgs.openblasCompat}/lib@'
+ '';
+ });
+
+ bindings-levmar = overrideCabal super.bindings-levmar (drv: {
+ preConfigure = ''
+ sed -i bindings-levmar.cabal \
+ -e 's,extra-libraries: lapack blas,extra-libraries: openblas,'
+ '';
+ extraLibraries = [ pkgs.openblas ];
+ });
+
# The Haddock phase fails for one reason or another.
attoparsec-conduit = dontHaddock super.attoparsec-conduit;
base-noprelude = dontHaddock super.base-noprelude;
@@ -150,6 +166,7 @@ self: super: {
types-compat = dontHaddock super.types-compat; # https://github.com/philopon/apiary/issues/15
wai-test = dontHaddock super.wai-test;
zlib-conduit = dontHaddock super.zlib-conduit;
+ record = dontHaddock super.record; # https://github.com/nikita-volkov/record/issues/22
# Jailbreak doesn't get the job done because the Cabal file uses conditionals a lot.
darcs = (overrideCabal super.darcs (drv: {
@@ -293,6 +310,7 @@ self: super: {
amqp-conduit = dontCheck super.amqp-conduit;
bitcoin-api = dontCheck super.bitcoin-api;
bitcoin-api-extra = dontCheck super.bitcoin-api-extra;
+ bitx-bitcoin = dontCheck super.bitx-bitcoin; # http://hydra.cryp.to/build/926187/log/raw
concurrent-dns-cache = dontCheck super.concurrent-dns-cache;
dbus = dontCheck super.dbus; # http://hydra.cryp.to/build/498404/log/raw
hadoop-rpc = dontCheck super.hadoop-rpc; # http://hydra.cryp.to/build/527461/nixlog/2/raw
@@ -305,6 +323,7 @@ self: super: {
marmalade-upload = dontCheck super.marmalade-upload; # http://hydra.cryp.to/build/501904/nixlog/1/raw
network-transport-tcp = dontCheck super.network-transport-tcp;
network-transport-zeromq = dontCheck super.network-transport-zeromq; # https://github.com/tweag/network-transport-zeromq/issues/30
+ pipes-mongodb = dontCheck super.pipes-mongodb; # http://hydra.cryp.to/build/926195/log/raw
raven-haskell = dontCheck super.raven-haskell; # http://hydra.cryp.to/build/502053/log/raw
riak = dontCheck super.riak; # http://hydra.cryp.to/build/498763/log/raw
scotty-binding-play = dontCheck super.scotty-binding-play;
@@ -402,6 +421,7 @@ self: super: {
http-client-openssl = dontCheck super.http-client-openssl;
http-client-tls = dontCheck super.http-client-tls;
ihaskell = dontCheck super.ihaskell;
+ influxdb = dontCheck super.influxdb;
itanium-abi = dontCheck super.itanium-abi;
katt = dontCheck super.katt;
language-slice = dontCheck super.language-slice;
@@ -757,7 +777,7 @@ self: super: {
dyre = appendPatch super.dyre ./dyre-nix.patch;
# https://github.com/gwern/mueval/issues/9
- mueval = markBrokenVersion "0.9.1.1" super.mueval;
+ mueval = appendPatch (appendPatch super.mueval ./mueval-fix.patch) ./mueval-nix.patch;
# Test suite won't compile against tasty-hunit 0.9.x.
zlib = dontCheck super.zlib;
@@ -779,11 +799,12 @@ self: super: {
# https://github.com/goldfirere/singletons/issues/116
# https://github.com/goldfirere/singletons/issues/117
# https://github.com/goldfirere/singletons/issues/118
- singletons = markBroken super.singletons;
- singleton-nats = dontDistribute super.singleton-nats;
+ clash-lib = dontDistribute super.clash-lib;
+ clash-verilog = dontDistribute super.clash-verilog;
hgeometry = dontDistribute super.hgeometry;
hipe = dontDistribute super.hipe;
- clash-lib = dontDistribute super.clash-lib;
+ singleton-nats = dontDistribute super.singleton-nats;
+ singletons = markBroken super.singletons;
# https://github.com/anton-k/temporal-music-notation/issues/1
temporal-music-notation = markBroken super.temporal-music-notation;
@@ -827,17 +848,29 @@ self: super: {
# FPCO's fork of Cabal won't succeed its test suite.
Cabal-ide-backend = dontCheck super.Cabal-ide-backend;
- # https://github.com/vincenthz/hs-cipher-aes/issues/35
- cipher-aes = dontCheck super.cipher-aes;
-
# https://github.com/DanielG/cabal-helper/issues/2
cabal-helper = overrideCabal super.cabal-helper (drv: { preCheck = "export HOME=$TMPDIR"; });
# https://github.com/jgm/gitit/issues/494
gitit = markBroken super.gitit;
- # https://github.com/maoe/influxdb-haskell/issues/26
- influxdb = markBroken (dontCheck super.influxdb);
- snaplet-influxdb = dontDistribute super.snaplet-influxdb;
+ # https://github.com/ekmett/comonad/issues/25
+ comonad = dontCheck super.comonad;
+
+ # https://github.com/ekmett/semigroupoids/issues/35
+ semigroupoids = disableCabalFlag super.semigroupoids "doctests";
+
+ # https://github.com/jaspervdj/websockets/issues/104
+ websockets = dontCheck super.websockets;
+
+ # Avoid spurious test suite failures.
+ fft = dontCheck super.fft;
+
+ # This package can't be built on non-Windows systems.
+ Win32 = overrideCabal super.Win32 (drv: { broken = !pkgs.stdenv.isCygwin; });
+ inline-c-win32 = dontDistribute super.inline-c-win32;
+
+ # Doesn't work with recent versions of mtl.
+ cron-compat = markBroken super.cron-compat;
}
diff --git a/pkgs/development/haskell-modules/configuration-ghc-7.10.x.nix b/pkgs/development/haskell-modules/configuration-ghc-7.10.x.nix
index ac02bbc8818..f2e0fb056e7 100644
--- a/pkgs/development/haskell-modules/configuration-ghc-7.10.x.nix
+++ b/pkgs/development/haskell-modules/configuration-ghc-7.10.x.nix
@@ -116,11 +116,6 @@ self: super: {
# https://github.com/kazu-yamamoto/unix-time/issues/30
unix-time = dontCheck super.unix-time;
- # Until the changes have been pushed to Hackage
- mueval = appendPatch super.mueval (pkgs.fetchpatch {
- url = "https://github.com/gwern/mueval/commit/c41aa40ed63b74c069d1e4e3caa8c8d890cde960.patch";
- sha256 = "0h1lx4z15imq009k0qmwkn5l3hmigw463ahvwffdnszi2n618kpg";
- });
present = appendPatch super.present (pkgs.fetchpatch {
url = "https://github.com/chrisdone/present/commit/6a61f099bf01e2127d0c68f1abe438cd3eaa15f7.patch";
sha256 = "1vn3xm38v2f4lzyzkadvq322f3s2yf8c88v56wpdpzfxmvlzaqr8";
@@ -230,7 +225,6 @@ self: super: {
cabal-install_1_18_1_0 = markBroken super.cabal-install_1_18_1_0;
containers_0_4_2_1 = markBroken super.containers_0_4_2_1;
control-monad-free_0_5_3 = markBroken super.control-monad-free_0_5_3;
- equivalence_0_2_5 = markBroken super.equivalence_0_2_5;
haddock-api_2_15_0_2 = markBroken super.haddock-api_2_15_0_2;
optparse-applicative_0_10_0 = markBroken super.optparse-applicative_0_10_0;
QuickCheck_1_2_0_1 = markBroken super.QuickCheck_1_2_0_1;
@@ -278,18 +272,4 @@ self: super: {
# Won't work with LLVM 3.5.
llvm-general = markBrokenVersion "3.4.5.3" super.llvm-general;
- # Ugly hack to trigger a rebuild to fix the broken package on Hydra.
- asn1-encoding = appendConfigureFlag super.asn1-encoding "-fignore-me-1";
- asn1-types = appendConfigureFlag super.asn1-types "-fignore-me-1";
- cmdargs = appendConfigureFlag super.cmdargs "-fignore-me-1";
- crypto-api = appendConfigureFlag super.crypto-api "-fignore-me-1";
- crypto-pubkey-types = appendConfigureFlag super.crypto-pubkey-types "-fignore-me-1";
- hourglass = appendConfigureFlag super.hourglass "-fignore-me-1";
- math-functions = appendConfigureFlag super.math-functions "-fignore-me-1";
- tagsoup = appendConfigureFlag super.tagsoup "-fignore-me-1";
- X11 = appendConfigureFlag super.X11 "-fignore-me-1";
- x509 = appendConfigureFlag super.x509 "-fignore-me-1";
- x509-store = appendConfigureFlag super.x509-store "-fignore-me-1";
- x509-system = appendConfigureFlag super.x509-system "-fignore-me-1";
-
}
diff --git a/pkgs/development/haskell-modules/configuration-ghc-7.8.x.nix b/pkgs/development/haskell-modules/configuration-ghc-7.8.x.nix
index 9327af856e8..9696ccddcc5 100644
--- a/pkgs/development/haskell-modules/configuration-ghc-7.8.x.nix
+++ b/pkgs/development/haskell-modules/configuration-ghc-7.8.x.nix
@@ -52,14 +52,13 @@ self: super: {
haddock-api = super.haddock-api_2_15_0_2;
# This is part of bytestring in our compiler.
- bytestring-builder = dontHaddock super.bytestring-builder;
+ bytestring-builder = triggerRebuild (dontHaddock super.bytestring-builder) 1;
# Won't compile against mtl 2.1.x.
imports = super.imports.override { mtl = self.mtl_2_2_1; };
# Newer versions require mtl 2.2.x.
mtl-prelude = self.mtl-prelude_1_0_3;
- equivalence = super.equivalence_0_2_5; # required by Agda
# purescript requires mtl 2.2.x.
purescript = overrideCabal (super.purescript.overrideScope (self: super: {
@@ -131,4 +130,7 @@ self: super: {
patchPhase = "sed -i -e 's|base ==4.8.*,|base,|' sandi.cabal"; }
);
+ # Overriding mtl 2.2.x is fine here because ghc-events is an stand-alone executable.
+ ghc-events = super.ghc-events.override { mtl = self.mtl_2_2_1; };
+
}
diff --git a/pkgs/development/haskell-modules/configuration-ghc-head.nix b/pkgs/development/haskell-modules/configuration-ghc-head.nix
index 73da57d7350..37cb69160b0 100644
--- a/pkgs/development/haskell-modules/configuration-ghc-head.nix
+++ b/pkgs/development/haskell-modules/configuration-ghc-head.nix
@@ -42,10 +42,27 @@ self: super: {
# haddock: No input file(s).
nats = dontHaddock super.nats;
+ bytestring-builder = dontHaddock super.bytestring-builder;
+
+ alex = dontCheck super.alex;
# We have time 1.5
aeson = disableCabalFlag super.aeson "old-locale";
+ # Show works differently for record syntax now, breaking haskell-src-exts' parser tests
+ # https://github.com/haskell-suite/haskell-src-exts/issues/224
+ haskell-src-exts = dontCheck super.haskell-src-exts;
+
+ mono-traversable = appendPatch super.mono-traversable (pkgs.fetchpatch {
+ url = "https://github.com/snoyberg/mono-traversable/pull/77.patch";
+ sha256 = "1qrvrh3cqfkymi5yb9y9z88rq4n7ag0ac2k00mcnqh4dz1vh4fg1";
+ });
+ yesod-auth = appendPatch super.yesod-auth (pkgs.fetchpatch {
+ url = "https://github.com/yesodweb/yesod/pull/1006.patch";
+ sha256 = "0l6wjj8cfz6jy6j92kywsccafyffhlm5240q82bzirb278adqvar";
+ stripLen = 1;
+ });
+
# Setup: At least the following dependencies are missing: base <4.8
hspec-expectations = overrideCabal super.hspec-expectations (drv: {
patchPhase = "sed -i -e 's|base < 4.8|base|' hspec-expectations.cabal";
diff --git a/pkgs/development/haskell-modules/generic-builder.nix b/pkgs/development/haskell-modules/generic-builder.nix
index edff84a0403..c0505d6e3c6 100644
--- a/pkgs/development/haskell-modules/generic-builder.nix
+++ b/pkgs/development/haskell-modules/generic-builder.nix
@@ -72,7 +72,10 @@ let
hasActiveLibrary = isLibrary && (enableStaticLibraries || enableSharedLibraries || enableLibraryProfiling);
- enableParallelBuilding = versionOlder "7.10" ghc.version || (versionOlder "7.8" ghc.version && !hasActiveLibrary);
+ # We cannot enable -j parallelism for libraries because GHC is far more
+ # likely to generate a non-determistic library ID in that case. Further
+ # details are at .
+ enableParallelBuilding = versionOlder "7.8" ghc.version && !hasActiveLibrary;
defaultConfigureFlags = [
"--verbose" "--prefix=$out" "--libdir=\\$prefix/lib/\\$compiler" "--libsubdir=\\$pkgid"
diff --git a/pkgs/development/haskell-modules/hackage-packages.nix b/pkgs/development/haskell-modules/hackage-packages.nix
index 934fc10fc06..75d61b83d96 100644
--- a/pkgs/development/haskell-modules/hackage-packages.nix
+++ b/pkgs/development/haskell-modules/hackage-packages.nix
@@ -8,8 +8,8 @@ self: {
({ mkDerivation, base, GLUT, OpenGL, random }:
mkDerivation {
pname = "3d-graphics-examples";
- version = "0.0.0.0";
- sha256 = "1v2zv94npviggqfqabfzp7ab54nnw9wdb60y20f1lzw13an0a14q";
+ version = "0.0.0.1";
+ sha256 = "13b7n9mdx7f6a2ghikc7xvscbj8wp0dxcbm5alinnic433sandy5";
isLibrary = false;
isExecutable = true;
buildDepends = [ base GLUT OpenGL random ];
@@ -1046,6 +1046,7 @@ self: {
];
description = "Big Contact Map Tools";
license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"BNFC" = callPackage
@@ -1078,13 +1079,12 @@ self: {
}:
mkDerivation {
pname = "BNFC-meta";
- version = "0.4.0.2";
- sha256 = "0d59kmbcwsdh34hagmhhcq0d0x49wmzl6kycm9p55i7cf0zw0a5l";
+ version = "0.4.0.3";
+ sha256 = "10rfljhygdl75ibmj0xqj7qwdk0ppjr8iw4wmvzdpl28mqjshny2";
buildDepends = [
alex-meta array base happy-meta haskell-src-meta syb
template-haskell
];
- jailbreak = true;
description = "Deriving Parsers and Quasi-Quoters from BNF Grammars";
license = stdenv.lib.licenses.gpl2;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -3202,8 +3202,8 @@ self: {
}:
mkDerivation {
pname = "DSH";
- version = "0.12.0.0";
- sha256 = "0rv7jn6h5w2naz7h4psz258684rc2p2wyaqp1f6kqvk294mlmvrv";
+ version = "0.12.0.1";
+ sha256 = "1m69phqjrb4wg6fji5plw1mghyz7jzzqixljaa5gb5s0cy5gfkfy";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -3958,12 +3958,17 @@ self: {
}) {};
"Earley" = callPackage
- ({ mkDerivation, base, containers, ListLike }:
+ ({ mkDerivation, base, containers, ListLike, tasty, tasty-hunit
+ , tasty-quickcheck, unordered-containers
+ }:
mkDerivation {
pname = "Earley";
- version = "0.8.0";
- sha256 = "0vg672jfj9a814pcbx19hkb2nsy0zndm1a98z5ygssy7m098cvgh";
- buildDepends = [ base containers ListLike ];
+ version = "0.8.1";
+ sha256 = "0bzm6pwim3fv0d1fv6k3078661vlpc0pcrds4ywsqvgc4hd91myk";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [ base containers ListLike unordered-containers ];
+ testDepends = [ base tasty tasty-hunit tasty-quickcheck ];
description = "Parsing all context-free grammars using Earley's algorithm";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -6755,8 +6760,8 @@ self: {
({ mkDerivation, base, hashable, mtl, unordered-containers }:
mkDerivation {
pname = "HMap";
- version = "1.2.3";
- sha256 = "0gxs0l5v2kzgy8lfyz0l3ivv1w6cb8sm30h6yv91np1nvj231nf3";
+ version = "1.2.4";
+ sha256 = "087a7ykk84lxa0c75wid6bkjmd89krgyrilxgps1fzl142hyvl13";
buildDepends = [ base hashable mtl unordered-containers ];
homepage = "https://github.com/atzeus/HMap";
description = "Fast heterogeneous maps and unconstrained typeable like functionality";
@@ -7623,8 +7628,8 @@ self: {
}:
mkDerivation {
pname = "HandsomeSoup";
- version = "0.4";
- sha256 = "0h760vfqgg40h50ybqpgpzh0skgbggx4xj1zaag3ca6l22950w36";
+ version = "0.4.2";
+ sha256 = "1yzfrvivvxwlaiqwbjx27rxwq9mmnnpb512vwklzw7nyzg9xmqha";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -8944,8 +8949,8 @@ self: {
}:
mkDerivation {
pname = "JuicyPixels";
- version = "3.2.5.1";
- sha256 = "11wpk4lr7h7s7mhl48i27dq1wwvzjviv2fnq3yl8dnikcl00k6dq";
+ version = "3.2.5.2";
+ sha256 = "07fyn0ns3g66aqpa1jg1v694yvf5idf7cknrkh30hs312lwm1sjl";
buildDepends = [
base binary bytestring containers deepseq mtl primitive
transformers vector zlib
@@ -9064,6 +9069,19 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "KSP" = callPackage
+ ({ mkDerivation, base }:
+ mkDerivation {
+ pname = "KSP";
+ version = "0.1";
+ sha256 = "19sjr9vavxnbv5yp2c01gy6iz1q2abllcsf378n15f3z064ffqn6";
+ buildDepends = [ base ];
+ jailbreak = true;
+ homepage = "https://github.com/frosch03/kerbal";
+ description = "A library with the kerbal space program universe and demo code";
+ license = stdenv.lib.licenses.publicDomain;
+ }) {};
+
"Kalman" = callPackage
({ mkDerivation, base, hmatrix }:
mkDerivation {
@@ -10078,6 +10096,18 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "MissingK" = callPackage
+ ({ mkDerivation, base, glib, template-haskell }:
+ mkDerivation {
+ pname = "MissingK";
+ version = "0.0.0.2";
+ sha256 = "0cynzg5piy14g5j576kf79dh4zqa5pcpwnpfl0fdkyy1rqm50q03";
+ buildDepends = [ base glib template-haskell ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Useful types and definitions missing from other libraries";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"MissingM" = callPackage
({ mkDerivation, base, HUnit, QuickCheck, test-framework
, test-framework-hunit, test-framework-quickcheck2, transformers
@@ -10627,9 +10657,9 @@ self: {
}:
mkDerivation {
pname = "Neks";
- version = "0.3.0.0";
- sha256 = "1nqww81d9hdm4d2kgv5k4vhp3wavlpa39vym4x7bddcxg1g5drmv";
- isLibrary = false;
+ version = "0.4.0.0";
+ sha256 = "0xi5d9wvk2xzsn500d61b6mmvwd36fs2n92l5qy4hzhww5lmkrrb";
+ isLibrary = true;
isExecutable = true;
buildDepends = [
base bytestring cereal containers directory hashable messagepack
@@ -11849,8 +11879,8 @@ self: {
}:
mkDerivation {
pname = "Plot-ho-matic";
- version = "0.5.0.4";
- sha256 = "05pipj20bx9is5snwf5nhavrs8873br4xvs3b1ggrvxgvaf8qhqw";
+ version = "0.5.0.5";
+ sha256 = "0x8mq7368yjb1q4xmkj6iqrxkf81d0vslfdrhp8cr12k83ydg3g3";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -12900,8 +12930,10 @@ self: {
({ mkDerivation, base, SDL }:
mkDerivation {
pname = "SDL";
- version = "0.6.5";
- sha256 = "1vlf1bvp4cbgr31qk6aqikhgn9jbgj7lrvnjzv3ibykm1hhd6vdb";
+ version = "0.6.5.1";
+ revision = "1";
+ sha256 = "1sa3zx3vrs1gbinxx33zwq0x2bsf3i964bff7419p7vzidn36k46";
+ editedCabalFile = "233e3fde4727ca7b597e0bf86619c6b862c32445191a37b7a536a3188634473e";
buildDepends = [ base ];
extraLibraries = [ SDL ];
description = "Binding to libSDL";
@@ -12913,8 +12945,8 @@ self: {
({ mkDerivation, base, SDL }:
mkDerivation {
pname = "SDL-gfx";
- version = "0.6.0";
- sha256 = "14d8fz576rwi6x0dxgc29cdmwn48afja3v5qx3x8q5y61fv8w9v1";
+ version = "0.6.0.1";
+ sha256 = "1ay72r29ybxf4icaqadly02xi03ifz82a8jz3xkvlk26c9bxl4c3";
buildDepends = [ base SDL ];
description = "Binding to libSDL_gfx";
license = stdenv.lib.licenses.bsd3;
@@ -12925,8 +12957,8 @@ self: {
({ mkDerivation, base, SDL, SDL_image }:
mkDerivation {
pname = "SDL-image";
- version = "0.6.1";
- sha256 = "18n6al40db7xalqqr4hp0l26qxxv1kmd8mva0n7vmhg05zypf6ni";
+ version = "0.6.1.1";
+ sha256 = "1m02q2426qp8m8pzz2jkk4srk2vb3j3ickiaga5jx9rkkhz732zq";
buildDepends = [ base SDL ];
extraLibraries = [ SDL_image ];
description = "Binding to libSDL_image";
@@ -12938,8 +12970,8 @@ self: {
({ mkDerivation, base, SDL, SDL_mixer }:
mkDerivation {
pname = "SDL-mixer";
- version = "0.6.1";
- sha256 = "1fxp5sz0w6pr5047jjvh81wkljxsl7fca239364i50m44mpcsyn1";
+ version = "0.6.1.1";
+ sha256 = "0md3238hx79mxb9a7l43kg3b3d28x4mqvj0hjsbsh15ajnvy9x2z";
buildDepends = [ base SDL ];
extraLibraries = [ SDL_mixer ];
description = "Binding to libSDL_mixer";
@@ -12964,8 +12996,8 @@ self: {
({ mkDerivation, base, SDL, SDL_ttf }:
mkDerivation {
pname = "SDL-ttf";
- version = "0.6.2";
- sha256 = "0jajnbqnhdd4i8pj8j27m53zwgfs1v06kiwy0s0zml02fdkq8j4a";
+ version = "0.6.2.1";
+ sha256 = "1ld551jgrcs3c7n53zyzlkrxkf01rp81wwvf9ynkm0c5kgll779s";
buildDepends = [ base SDL ];
extraLibraries = [ SDL_ttf ];
description = "Binding to libSDL_ttf";
@@ -14410,6 +14442,24 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "TestExplode" = callPackage
+ ({ mkDerivation, base, containers, directory, fgl, graphviz
+ , interpolatedstring-perl6, mtl, process, text
+ }:
+ mkDerivation {
+ pname = "TestExplode";
+ version = "0.1.0.0";
+ sha256 = "0r4nwzwdila9p05g5y99rp06dbh1k2yl5jsc6yn6dwvxkvvdjcs1";
+ buildDepends = [
+ base containers directory fgl graphviz interpolatedstring-perl6 mtl
+ process text
+ ];
+ jailbreak = true;
+ homepage = "https://github.com/testexplode/testexplode";
+ description = "Generates testcases from program-snippets";
+ license = stdenv.lib.licenses.gpl3;
+ }) {};
+
"Theora" = callPackage
({ mkDerivation, base, ogg, theora }:
mkDerivation {
@@ -16924,10 +16974,10 @@ self: {
({ mkDerivation, base, ghc-prim, mtl, transformers }:
mkDerivation {
pname = "acme-timemachine";
- version = "0.0.0.1";
- sha256 = "06zhslaa7kp75gvnvh2ln15bqbdqgbgya6i4r2jkqxycnk8sczzl";
+ version = "0.0.1.0";
+ sha256 = "1dfwn0n4hg6zs4ikz6jzkn2spwsvchs1jgq7662aq4ljyp7f1rvb";
buildDepends = [ base ghc-prim mtl transformers ];
- description = "An easy way to perform and unperform IO actions";
+ description = "An easy way to perform and unperform IO and other stateful actions";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -17051,6 +17101,7 @@ self: {
transformers
];
testDepends = [ base directory doctest filepath ];
+ jailbreak = true;
homepage = "http://github.com/ekmett/ad";
description = "Automatic Differentiation";
license = stdenv.lib.licenses.bsd3;
@@ -17676,8 +17727,8 @@ self: {
}:
mkDerivation {
pname = "agentx";
- version = "0.1.0.5";
- sha256 = "0a6zzn4zv5f1zl10vz1p4iw32s9jd605px4ziy5v24fmjm5xnbzb";
+ version = "0.2.0.0";
+ sha256 = "0pmnrij90xag46af4c5yws5g26pf77l5ck864f4cyw5g9acw67g6";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -17840,8 +17891,8 @@ self: {
}:
mkDerivation {
pname = "aivika-experiment";
- version = "3.1";
- sha256 = "19x4y060r9cgkfffyxdgilmrrjv4ycpxv6w8gclkfrxj1ywwkwx4";
+ version = "4.0.3";
+ sha256 = "1v0x37kmav87b3mxvribw6658glf5hbk7npipkabp1qbfz5sp7zv";
buildDepends = [
aivika base containers directory filepath mtl network-uri
parallel-io split
@@ -17874,8 +17925,8 @@ self: {
}:
mkDerivation {
pname = "aivika-experiment-chart";
- version = "3.1";
- sha256 = "17bp7bp3x7z3xlzd6922mjm44v8jlkw1ak3zfr31146hlifgfhyw";
+ version = "4.0.3";
+ sha256 = "1c5xzp0n67fg799cdf6aqc7sxbv3dy6nkiilyc5hlr8bg3r20bpd";
buildDepends = [
aivika aivika-experiment array base Chart colour containers
data-default-class filepath lens mtl split
@@ -17959,8 +18010,8 @@ self: {
({ mkDerivation, base, stm, time, unbounded-delays }:
mkDerivation {
pname = "alarmclock";
- version = "0.2.0.6";
- sha256 = "1jr4pxrgz6gq1dcnkkggbaq3gnj0gr1g14mf174f2b4qzgl63cq1";
+ version = "0.2.0.8";
+ sha256 = "1g06bnbp0y6dcz7zgbh828klk7xc1spwzw3ff6jpqh74cm82vq6f";
buildDepends = [ base stm time unbounded-delays ];
testDepends = [ base time ];
homepage = "https://bitbucket.org/davecturner/alarmclock";
@@ -18007,13 +18058,12 @@ self: {
}:
mkDerivation {
pname = "alex-meta";
- version = "0.3.0.7";
- sha256 = "05a290b997kxm2rl0w98c3fzq33866pi69pmmahqvw631cp2c6ni";
+ version = "0.3.0.8";
+ sha256 = "1ja5y2dyil4h6j7q9dhrxzhry018fqc7vy3v5mrkvxyp7bhw1n9f";
buildDepends = [
array base containers haskell-src-meta QuickCheck template-haskell
];
buildTools = [ alex happy ];
- jailbreak = true;
description = "Quasi-quoter for Alex lexers";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -18536,8 +18586,8 @@ self: {
}:
mkDerivation {
pname = "amazonka";
- version = "0.3.4";
- sha256 = "19fzhsrlsqrncngcmdl8wr0rbv8ff0k8y91dn6j1hacz0dv1whhk";
+ version = "0.3.6";
+ sha256 = "1snzrclzs275gks19glrrayiysvywzwpzx6y5hnwmm48z4lh4gsb";
buildDepends = [
amazonka-core base bytestring conduit conduit-extra cryptohash
cryptohash-conduit exceptions http-conduit lens mmorph
@@ -18553,8 +18603,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-autoscaling";
- version = "0.3.4";
- sha256 = "0kndkj4x7wmmxpsr3a42ck2zq7amm33axxlhwzlgi1gnv8v2v4y4";
+ version = "0.3.6";
+ sha256 = "11dkcf0arjimvdzdin690811hs9klhr4xbhmjxcvqmwjr0z0sbb9";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Auto Scaling SDK";
@@ -18565,8 +18615,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudformation";
- version = "0.3.4";
- sha256 = "0nhy1qn8abhnmr85n1ddshwjwns0gc0l1syznfg6g6cmazwq7809";
+ version = "0.3.6";
+ sha256 = "0m64p8xgwskv5vyzkkd5cxcwg5a7qa86a8sndan7yffap5b4nzq3";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudFormation SDK";
@@ -18577,8 +18627,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudfront";
- version = "0.3.4";
- sha256 = "1yp59hdxnnvjsdpaw4c311p30bg9xyj231hn2r1zis3awck8jlkk";
+ version = "0.3.6";
+ sha256 = "09kl01agnmq24r1ip2f047ayrlf95x51nm80l3g40lx91n3mc7rp";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudFront SDK";
@@ -18589,8 +18639,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudhsm";
- version = "0.3.4";
- sha256 = "1f26vpfxqkkm1yli42xhbhhzya07gvg9kjhq5p51p32500aax4my";
+ version = "0.3.6";
+ sha256 = "0m17yjilg4d7hm8d5mbs3bqsm9hlxcybk9b49bj06266jcd9rxff";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudHSM SDK";
@@ -18601,8 +18651,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudsearch";
- version = "0.3.4";
- sha256 = "0lp09i3h527g8l7xcxqk6n1pjlbdhxncpgdsrd8bv91an39cnj12";
+ version = "0.3.6";
+ sha256 = "1hyapllcv5g2s8qxmyigy2k0fha9k07dd2jax69hkwi2qv88cks5";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudSearch SDK";
@@ -18613,8 +18663,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudsearch-domains";
- version = "0.3.4";
- sha256 = "06sb1zmgvsbshndix9gdx8vq4378p8sgwnnkwhzm1sr92yzfv4is";
+ version = "0.3.6";
+ sha256 = "0dfi0flb77zjbjzdsfybr0hxwwdh2qd1pc5pry88l57iibjhmxym";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudSearch Domain SDK";
@@ -18625,8 +18675,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudtrail";
- version = "0.3.4";
- sha256 = "125vn9vk4mk61r4r5c3parhrqdxkmlvqprly1x0chd044nx5ai80";
+ version = "0.3.6";
+ sha256 = "07b47dy9r1f7dl5zq6z1zx1xa9q4qlack49zy8y48x1im90dnc9x";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudTrail SDK";
@@ -18637,8 +18687,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudwatch";
- version = "0.3.4";
- sha256 = "1lsdy65cg3wrhpzsaiir0mq510dilia1m0lqwg1fnrcl62xlcsd9";
+ version = "0.3.6";
+ sha256 = "14vx5v9iicxv768637v8smzwj04nhd80dcrwrxq3yqqlq9mbk9nk";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudWatch SDK";
@@ -18649,8 +18699,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cloudwatch-logs";
- version = "0.3.4";
- sha256 = "1wxrxak7l8drba6hckhx0idqj26fbppnxw5hj4cnmjrg4pvjpnmn";
+ version = "0.3.6";
+ sha256 = "15xpyfifqm6c5s4ysak1y0sgn6h5g9bapl69s9dpacg7nfpajqvb";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CloudWatch Logs SDK";
@@ -18661,8 +18711,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-codedeploy";
- version = "0.3.4";
- sha256 = "1sws6d2a21r7wwd2dyf4k7g2n2f0r5azydj7pg6g5a2sjfazimi0";
+ version = "0.3.6";
+ sha256 = "1cp99l1kjm0w0jb1c4brq00dy4mn53pycra5gvlvz9k210g72ndm";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon CodeDeploy SDK";
@@ -18673,8 +18723,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cognito-identity";
- version = "0.3.4";
- sha256 = "0vp1r171myahkx8n5mndjabggy219mzbzxyfz93mwpnyf1z7cdvm";
+ version = "0.3.6";
+ sha256 = "1ig50w3z85y8g7hiq1hahbv529kq5pfrcpqwsrpf1zwynl50jjkz";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Cognito Identity SDK";
@@ -18685,8 +18735,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-cognito-sync";
- version = "0.3.4";
- sha256 = "04mc8cjn1hdprki0hvbbyb7gzsdxdr7lci41vnmhw6ic3gcy2mhv";
+ version = "0.3.6";
+ sha256 = "1m6nw80ls7rl55ci36y2xvw8a1wfqiv64wm3q4anzmyybl50s133";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Cognito Sync SDK";
@@ -18697,8 +18747,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-config";
- version = "0.3.4";
- sha256 = "1qxkzqvfid2g7hcc427zhy8llfa25wpimi7cfdzl9dqmmkqlxinm";
+ version = "0.3.6";
+ sha256 = "0aa73cmlaydayvy6vxbxdz5br8a6hsns3dn3s06r4nzxxy7zmfzg";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Config SDK";
@@ -18716,8 +18766,8 @@ self: {
}:
mkDerivation {
pname = "amazonka-core";
- version = "0.3.4";
- sha256 = "0sih0wvncrz6v4xcn34ckhxc7b15bx87qbr7icwk1w6zs08809jz";
+ version = "0.3.6";
+ sha256 = "1l60z0fcfbyrhi7r4lfy2a6b2vwc4bn1swd6ddna19qyq9fn67l2";
buildDepends = [
aeson attoparsec base base16-bytestring base64-bytestring
bifunctors bytestring case-insensitive conduit conduit-extra
@@ -18738,8 +18788,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-datapipeline";
- version = "0.3.4";
- sha256 = "0f7y3wb9ijd8hjxbzav63zdwrjhzh000xqc4n2cnx0lrcrssvs2i";
+ version = "0.3.6";
+ sha256 = "0p0k76hiif5nd4kxm1ww6p0srjfmmq8q3xln4sbkq8ss448zfymh";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Data Pipeline SDK";
@@ -18750,8 +18800,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-directconnect";
- version = "0.3.4";
- sha256 = "1y6nyjf8m2py5wnk3cbypi0ckqv7nyr2la3h8nm1wj8njwh359jn";
+ version = "0.3.6";
+ sha256 = "0q258fxwklm5xwyzram3kdq3ylayk498a02xzs7v2vb2vd3pmdb6";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Direct Connect SDK";
@@ -18762,8 +18812,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-dynamodb";
- version = "0.3.4";
- sha256 = "160nk75112sdnf834gpc0y1fzsbb0lrp98g9zim38rd4v7pz2ax9";
+ version = "0.3.6";
+ sha256 = "1k6kzip69sjakcw1y7n0xjd0qjpbrk604fs4hng8n6az107vbdjq";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon DynamoDB SDK";
@@ -18774,8 +18824,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-ec2";
- version = "0.3.4";
- sha256 = "0chfyyryyk8vd1783021awvwwla5fdm04x3w500157xvazhk286m";
+ version = "0.3.6";
+ sha256 = "050gspxplhch66awd7gmxyyy3s466ca3jbzp2yq4qh32dn7n1hvi";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Elastic Compute Cloud SDK";
@@ -18786,8 +18836,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-ecs";
- version = "0.3.4";
- sha256 = "1pv79b0865gqpf89abjjk4y24d6nr2lk45xpn0n7ckri0b54dga4";
+ version = "0.3.6";
+ sha256 = "1md59pdqir5prlfwlmlgd78g6c9gq0dszm2lxpa3kbv9zxs1kgfr";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon EC2 Container Service SDK";
@@ -18798,8 +18848,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-elasticache";
- version = "0.3.4";
- sha256 = "01mg116sqxa4z7ss0fwzvsgkmxrqs52ac9z6mrsfymjspyd9fbli";
+ version = "0.3.6";
+ sha256 = "0hapj08jj89gl934zgkfj2lg9bsc71y1mvdl5dmv4vk8qrwp912a";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon ElastiCache SDK";
@@ -18810,8 +18860,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-elasticbeanstalk";
- version = "0.3.4";
- sha256 = "13lzdnwg9x2jrhk251b0vrg4y2avg77ppq4wdgjzmbb2myp618ll";
+ version = "0.3.6";
+ sha256 = "1bpixxvj4rdx3v07f2pdky0xbz0kz5p3afjazwv8w588sj2i6773";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Elastic Beanstalk SDK";
@@ -18822,8 +18872,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-elastictranscoder";
- version = "0.3.4";
- sha256 = "1wi1h07pp8n45ynn9lqvjfz265k0bp7qqxk5qmqlg93yajgjfkcl";
+ version = "0.3.6";
+ sha256 = "1rfnzwl6z0ym2ln5nbcx6an2iiqcwnb3rjki2jnxpqkv6hj8d1p8";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Elastic Transcoder SDK";
@@ -18834,8 +18884,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-elb";
- version = "0.3.4";
- sha256 = "11ky0g8cgnd6lcjdc6a9087ka5f6hc3x08xnvjjfwipmdhps4k9r";
+ version = "0.3.6";
+ sha256 = "0yriv45wrxw9jns17idiqwxxvh086g3bg2hclzaanzxllir4jb59";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Elastic Load Balancing SDK";
@@ -18846,8 +18896,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-emr";
- version = "0.3.4";
- sha256 = "1dq1xs7simxcag3c2bcr22k1595avl69jz6zv3nrsn1rvzj9milv";
+ version = "0.3.6";
+ sha256 = "0pv0li7823alrgl9w1fjx9i02ndk4k12fbb6z5z50krypcxp8819";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Elastic MapReduce SDK";
@@ -18858,8 +18908,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-glacier";
- version = "0.3.4";
- sha256 = "1dd635s0i9imj62dg9rqvfrx2aqw6593z61ckqixlb247jii82i6";
+ version = "0.3.6";
+ sha256 = "0i3j1yha1hjj7imqn6m42329p3637v09hbjampq0c500dvy1j5dl";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Glacier SDK";
@@ -18870,8 +18920,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-iam";
- version = "0.3.4";
- sha256 = "1snh7xs2f2mjr3ln24xj73y5idmb45in1ykaz3v5wbqdb19m4w94";
+ version = "0.3.6";
+ sha256 = "0nzs9xn70f2a0n3xdnprwdk0mwnr23cgq0rwwxc83gf08i19nl8j";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Identity and Access Management SDK";
@@ -18882,8 +18932,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-importexport";
- version = "0.3.4";
- sha256 = "15xgfxlrjhn8inl5a0rfsyyy8sp0rinlwll9snpdl7nrnqvmn00s";
+ version = "0.3.6";
+ sha256 = "1qcqzqg9sxqaf5kb3l91n7zp5brdpyv2mhy7da08wxb16f1v1r9x";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Import/Export SDK";
@@ -18894,8 +18944,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-kinesis";
- version = "0.3.4";
- sha256 = "0fag3xr9w2gi038hh9kiqmqgbsn53x48h9jwj49cr1r9qrrs86wa";
+ version = "0.3.6";
+ sha256 = "0r4s5qfpirapg2gsgk9gbyp3ap4pz3cpnz4wdidlc4ys9v4vfhay";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Kinesis SDK";
@@ -18906,8 +18956,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-kms";
- version = "0.3.4";
- sha256 = "0ds97lk5ifc529199lmvijs5gif4bzh8lwczpz1xspin37bjiz62";
+ version = "0.3.6";
+ sha256 = "1x68jg5m79rapwvb6nb9xmf2hwdv34r63r0aar742igpjwssxzn9";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Key Management Service SDK";
@@ -18918,8 +18968,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-lambda";
- version = "0.3.4";
- sha256 = "1njdwml6mp8phd323cgyfw7v2iv8l4k7r6pi4vq4mygpa2gx0dn1";
+ version = "0.3.6";
+ sha256 = "1g6gf64k60zanmv787rsg8zxnv6vxzdwv3dibwm5b00fzw7cshlp";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Lambda SDK";
@@ -18930,8 +18980,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-ml";
- version = "0.3.4";
- sha256 = "1sv6a74gk30rhsh98j2f6xsad6hfcr3cjyi8ahz1qjh4nqjrrssc";
+ version = "0.3.6";
+ sha256 = "0ma60mdn14xs3999yg98dzlx96arlwrc9wsvgf0gq6s6c0gnrc04";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Machine Learning SDK";
@@ -18942,8 +18992,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-opsworks";
- version = "0.3.4";
- sha256 = "07l7a4v7s380vj8348bgv1m1hk1ldc41aphl67f17v2cndys3ml0";
+ version = "0.3.6";
+ sha256 = "1d9qgazp4qk6lc4isggb0rm50crp0s1qmz6m0s3wwfdwd6lvhaql";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon OpsWorks SDK";
@@ -18954,8 +19004,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-rds";
- version = "0.3.4";
- sha256 = "1ji80nn9k10l9w5k5dqwhc0i2aaxa4l6bl995im5lrihilmazqgw";
+ version = "0.3.6";
+ sha256 = "105xj8zrjha5yvpj8m0r7asy0hys17g1gglf95kgnkwdh9zhj3yl";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Relational Database Service SDK";
@@ -18966,8 +19016,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-redshift";
- version = "0.3.4";
- sha256 = "18sd3abhpifwb4ylz35bnxzappgslpvzkrv9wh3hxqzs4mvxdj1n";
+ version = "0.3.6";
+ sha256 = "195lawjhy6hmfwk05cm9wi2x8pn6f3zr8rhcvrwa0igg8xi39fpr";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Redshift SDK";
@@ -18978,8 +19028,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-route53";
- version = "0.3.4";
- sha256 = "05a77qcjlkjk0mv2ry25dlci43h5b9hh50f32ngqccjqmg4128ky";
+ version = "0.3.6";
+ sha256 = "1xk44z5zp8pr2hyhdshzgwm572y33f9lvjz6yrglc4vpangslcx3";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Route 53 SDK";
@@ -18990,8 +19040,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-route53-domains";
- version = "0.3.4";
- sha256 = "15qvmw6fgfcqgkqafywpai5i1in9iibl1r8m8pfxfdckmrbzaxz2";
+ version = "0.3.6";
+ sha256 = "13dykx5w35dj3fn7nqs3znisjzqczpsxxyyghh2kfsgfhxna0kqv";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Route 53 Domains SDK";
@@ -19002,8 +19052,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-s3";
- version = "0.3.4";
- sha256 = "0miyf7nnkxwybps3yg5fyqpxq5hkz4kllks5w4r7c62hd7sjq9dn";
+ version = "0.3.6";
+ sha256 = "1q45d6g4wrfjmw9d65bvrin1p9vcfv5xyz47158p9zxm2cvpvcv9";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Simple Storage Service SDK";
@@ -19014,8 +19064,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-sdb";
- version = "0.3.4";
- sha256 = "0jsg4g911qm3r8saxwax4rhdmg1kgfmagnnyzjv4rb02jkdfr7i1";
+ version = "0.3.6";
+ sha256 = "1wswsirmjq1zvhppv4bk4h9k2b94hdl1w8q18c7mh5i4j6kx41lc";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon SimpleDB SDK";
@@ -19026,8 +19076,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-ses";
- version = "0.3.4";
- sha256 = "0s0aa3fryvqwmp0zzmlzd0mk591i1c63qds0si3svf85zgl3slr4";
+ version = "0.3.6";
+ sha256 = "1f7k13mpf1hs27li4fdfv4wsbckyljmhwf9i6r176h6lkkb24vxx";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Simple Email Service SDK";
@@ -19038,8 +19088,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-sns";
- version = "0.3.4";
- sha256 = "1plrzqlvfn2aa0c4l2dh4nlygnv0biykz414yblcrj53w03yhqs2";
+ version = "0.3.6";
+ sha256 = "00bln36dmxikxgjyib009i3y56nln4i4j58nj89sclc87mdbzbma";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Simple Notification Service SDK";
@@ -19050,8 +19100,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-sqs";
- version = "0.3.4";
- sha256 = "0bc0n71vhmcirij5agxy7h0zvqvm4psw5h3kzrnbib9wa2hkq8m4";
+ version = "0.3.6";
+ sha256 = "04qz8d81xz5pj3ib7cpxrig61n70val2vgjjy3xc0wjki3sk7xw8";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Simple Queue Service SDK";
@@ -19062,8 +19112,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-ssm";
- version = "0.3.4";
- sha256 = "03p76rska5gl2ic7vjyhhdb89ikl17n8xkiwcb4184jzsvnscqzi";
+ version = "0.3.6";
+ sha256 = "1xzz82hxh0am6mgzgqx0w8lxm5q8d3zpny2qyyl7bjyjh8k7v370";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Simple Systems Management Service SDK";
@@ -19074,8 +19124,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-storagegateway";
- version = "0.3.4";
- sha256 = "016wi9cq86z0giv68kzfdg2ia0m4kvlcsl6dj9d3cnvbcsg7s6xy";
+ version = "0.3.6";
+ sha256 = "1cjajpwf0lfvn3r62n7y4ly16496cn7qhs17grjxv3c9i8pikq2z";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Storage Gateway SDK";
@@ -19086,8 +19136,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-sts";
- version = "0.3.4";
- sha256 = "1fmjsvcxjrls98jd3vcldjy9wvsdkyi614rzs1d5bi11b6db202z";
+ version = "0.3.6";
+ sha256 = "096av2p79b4vnb3zzmkbjspvxkcgzx77w96mrziggfj8mxh3x5f1";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Security Token Service SDK";
@@ -19098,8 +19148,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-support";
- version = "0.3.4";
- sha256 = "1kzy3nbc17dbbhi2k60da7rl6k2zbahzd9rjshvmn1fdsb61piq5";
+ version = "0.3.6";
+ sha256 = "0igaq8538vrbwn7pqap5500alx3lp1c37imq75gk9nx7q846gqy6";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Support SDK";
@@ -19110,8 +19160,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-swf";
- version = "0.3.4";
- sha256 = "1w7ac4d7gj53hjvlk0sldww67gkgsbi8vmqhbcbqrbg2mrqr6l9d";
+ version = "0.3.6";
+ sha256 = "0mijdc797ybdz7g0nkyncahspsl0dpy3g8hkhcj2jdhhdbqn7qfc";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon Simple Workflow Service SDK";
@@ -19122,8 +19172,8 @@ self: {
({ mkDerivation, amazonka-core, base }:
mkDerivation {
pname = "amazonka-workspaces";
- version = "0.3.4";
- sha256 = "00gdahix24cm3qan11a9n2l1n9x0cnnxgid2gf4zhjqmvc3342sa";
+ version = "0.3.6";
+ sha256 = "1hwlm2a5fn4hrqqv79iw39xrrgfhl1d1p6236lqqfdyycnq4x5wk";
buildDepends = [ amazonka-core base ];
homepage = "https://github.com/brendanhay/amazonka";
description = "Amazon WorkSpaces SDK";
@@ -19242,8 +19292,8 @@ self: {
}:
mkDerivation {
pname = "anansi";
- version = "0.4.7";
- sha256 = "0am6c4chbysgs63n3wbd4lfxdzkg6fzj4xgp6i26z4vhj49qk890";
+ version = "0.4.8";
+ sha256 = "1fzrry9axri0wcff0zbxq0dbq0pxyq6x6bzw426xkm3ayzfd825a";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -19320,8 +19370,8 @@ self: {
}:
mkDerivation {
pname = "angel";
- version = "0.5.2";
- sha256 = "0h2nyxv56cshkxlbq5j54220w7x2y0m1aaqzqz6dhipff29pmr39";
+ version = "0.6.1";
+ sha256 = "1wkllv4ziggj3smhghdk5qsgccds9d69rhx1gi079ph7z533w2dc";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -19735,7 +19785,9 @@ self: {
mkDerivation {
pname = "apiary";
version = "1.4.3";
+ revision = "1";
sha256 = "1z6fgdkn3k4sbwk5jyz6yp9qwllhv2m9vq7z25fhmj41y3spgcsc";
+ editedCabalFile = "024867d05ec04c0b83c41e948b80c56686cc170beed600daffa8d8c725e50a32";
buildDepends = [
base blaze-builder blaze-html blaze-markup bytestring
bytestring-read case-insensitive data-default-class exceptions
@@ -19748,7 +19800,6 @@ self: {
base bytestring http-types HUnit mtl tasty tasty-hunit
tasty-quickcheck wai wai-extra
];
- jailbreak = true;
homepage = "https://github.com/philopon/apiary";
description = "Simple and type safe web framework that generate web API documentation";
license = stdenv.lib.licenses.mit;
@@ -19803,14 +19854,13 @@ self: {
mkDerivation {
pname = "apiary-cookie";
version = "1.4.0";
- revision = "1";
+ revision = "2";
sha256 = "017bxqavv4w5r2ghgmyhljqa4fyzl02v2sjwxi056s3phgrlrkrx";
- editedCabalFile = "50b9adcb346e7233cb73eef7e7d00902a7b43454ab998f76923582bada569e32";
+ editedCabalFile = "4edecbd2a1e6fb740815be85cc9c4836144338af88e6774348a1703e861a9771";
buildDepends = [
apiary base blaze-builder blaze-html bytestring cookie time
types-compat wai web-routing
];
- jailbreak = true;
homepage = "https://github.com/philopon/apiary";
description = "Cookie support for apiary web framework";
license = stdenv.lib.licenses.mit;
@@ -19859,15 +19909,14 @@ self: {
mkDerivation {
pname = "apiary-logger";
version = "1.4.0";
- revision = "1";
+ revision = "2";
sha256 = "0pf030sn4mf05avl11hs9kz6qi9667s2vavn3wsxp1anl9bghk48";
- editedCabalFile = "cb2677faabb41ccf7a4990179990f55c14d5bcd517591ccd086b84c68362c93c";
+ editedCabalFile = "ce71ccd5e0a1f20777b17efdc536aab8f43a3468f54fa14609c635aa731ce944";
buildDepends = [
apiary base data-default-class fast-logger lifted-base
monad-control monad-logger transformers transformers-base
types-compat
];
- jailbreak = true;
homepage = "https://github.com/philopon/apiary";
description = "fast-logger support for apiary web framework";
license = stdenv.lib.licenses.mit;
@@ -19928,6 +19977,7 @@ self: {
resource-pool resourcet transformers transformers-base types-compat
web-routing
];
+ jailbreak = true;
homepage = "https://github.com/philopon/apiary";
description = "persistent support for apiary web framework";
license = stdenv.lib.licenses.mit;
@@ -21324,11 +21374,11 @@ self: {
({ mkDerivation, base, bimap, containers, mtl, process, syb }:
mkDerivation {
pname = "atom";
- version = "1.0.12";
- sha256 = "0mavmgaw9wb7sjrmr49h2xw4xvzywgbflvvxym0l9wc91dd3zhrp";
+ version = "1.0.13";
+ sha256 = "111lz39q12rvh2iigxakcnf2firxgbgm462id805n3z7rmg8f807";
buildDepends = [ base bimap containers mtl process syb ];
homepage = "http://tomahawkins.org";
- description = "A DSL for embedded hard realtime applications";
+ description = "An EDSL for embedded hard realtime applications";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
@@ -21642,6 +21692,18 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "attoparsec-trans" = callPackage
+ ({ mkDerivation, attoparsec, base, transformers }:
+ mkDerivation {
+ pname = "attoparsec-trans";
+ version = "0.1.0.3";
+ sha256 = "11a743qgh9rwjyf1hng5jg139xr11dsjj1bisqaaayb17addd2xx";
+ buildDepends = [ attoparsec base transformers ];
+ homepage = "https://github.com/srijs/haskell-attoparsec-trans";
+ description = "Interleaved effects for attoparsec parsers";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"attosplit" = callPackage
({ mkDerivation, attoparsec, base, bytestring }:
mkDerivation {
@@ -22067,10 +22129,8 @@ self: {
}:
mkDerivation {
pname = "aws";
- version = "0.12";
- revision = "1";
- sha256 = "1vjqrj3hj92vvik2c3qlld9gyh0an4xl2hx01hnpypgawa1j1180";
- editedCabalFile = "c40b53aee98659e34f2383439dacd26bb98228056283a05d25e55b3c8226f4a7";
+ version = "0.12.1";
+ sha256 = "0aykch71qakmxn47i6h23h52dp41x7kwcibv527xg57ab71vm1bc";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -22086,7 +22146,6 @@ self: {
mtl QuickCheck quickcheck-instances resourcet tagged tasty
tasty-quickcheck text time transformers transformers-base
];
- jailbreak = true;
homepage = "http://github.com/aristidb/aws";
description = "Amazon Web Services (AWS) for Haskell";
license = stdenv.lib.licenses.bsd3;
@@ -22130,6 +22189,24 @@ self: {
license = stdenv.lib.licenses.asl20;
}) {};
+ "aws-dynamodb-conduit" = callPackage
+ ({ mkDerivation, aeson, attoparsec-trans, aws, base, bytestring
+ , conduit, http-conduit, http-types, json-togo, resourcet, text
+ , transformers
+ }:
+ mkDerivation {
+ pname = "aws-dynamodb-conduit";
+ version = "0.1.0.2";
+ sha256 = "02q49anmairvjwzvgn8kqx27965n71xbyi86wwlmrs4w0dkbsd41";
+ buildDepends = [
+ aeson attoparsec-trans aws base bytestring conduit http-conduit
+ http-types json-togo resourcet text transformers
+ ];
+ homepage = "https://github.com/srijs/haskell-aws-dynamodb-query";
+ description = "Conduit-based interface for AWS DynamoDB";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"aws-dynamodb-streams" = callPackage
({ mkDerivation, aeson, attoparsec, aws, aws-general, base
, base-unicode-symbols, base16-bytestring, base64-bytestring
@@ -22913,8 +22990,8 @@ self: {
}:
mkDerivation {
pname = "banwords";
- version = "0.1.0.0";
- sha256 = "0r35w2kv9nfsz67bmcc9k9pg7k1d1k00cz5y16cpjra200mz847z";
+ version = "0.2.0.0";
+ sha256 = "18k39zgc5n9bxabv0wkiay9h3phx75mfr4kqpcp1hlpikn4h6wxx";
buildDepends = [
attoparsec base bytestring data-default text vector
];
@@ -23300,8 +23377,8 @@ self: {
}:
mkDerivation {
pname = "basic-prelude";
- version = "0.4.1";
- sha256 = "041wnym7b8p70kcbkxxbgszmi2y88xs0ww357jrn0v6cc21h60j9";
+ version = "0.5.0";
+ sha256 = "1l8hc99sxm27gd93zq6v0l0x2rzl6fd9zp7snh14m4yriqrn5xfi";
buildDepends = [
base bytestring containers filepath hashable lifted-base ReadArgs
safe text transformers unordered-containers vector
@@ -23733,8 +23810,8 @@ self: {
({ mkDerivation, base }:
mkDerivation {
pname = "between";
- version = "0.9.0.2";
- sha256 = "0n3nx077hv10rwv2kl3n1a3v40sr1qzfj9jwb6cvd1l0zx42igw8";
+ version = "0.10.0.0";
+ sha256 = "10bj4v2451c9dri3r9c825xnr4lb8jhihr05nhc6m8fdvqnyqvsi";
buildDepends = [ base ];
homepage = "https://github.com/trskop/between";
description = "Function combinator \"between\" and derived combinators";
@@ -24941,8 +25018,8 @@ self: {
}:
mkDerivation {
pname = "bindings-nettle";
- version = "0.2";
- sha256 = "1pk2gwd5wbs1bhna5npwrzrvd6cxss8sbigsa8lsqsarh8mbd5sr";
+ version = "0.4";
+ sha256 = "11fnyjxb6gvl2mfnsahzadd5xj0y1p25n98qbhrkzziaihsf01ph";
buildDepends = [ base bindings-DSL ];
testDepends = [
base bytestring hspec HUnit QuickCheck quickcheck-io
@@ -24988,6 +25065,19 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "bindings-potrace" = callPackage
+ ({ mkDerivation, base, bindings-DSL, potrace }:
+ mkDerivation {
+ pname = "bindings-potrace";
+ version = "0.1";
+ sha256 = "0vb889f49li0lwy3zsji0f1cwzriizh9x6kg3r8676q5j08p7znd";
+ buildDepends = [ base bindings-DSL ];
+ extraLibraries = [ potrace ];
+ homepage = "https://github.com/rwbarton/bindings-potrace";
+ description = "Low-level bindings to the potrace bitmap tracing library";
+ license = stdenv.lib.licenses.gpl2;
+ }) { inherit (pkgs) potrace;};
+
"bindings-ppdev" = callPackage
({ mkDerivation, base, bindings-DSL, ioctl }:
mkDerivation {
@@ -25385,8 +25475,8 @@ self: {
}:
mkDerivation {
pname = "bitcoin-api";
- version = "0.11.1";
- sha256 = "16slfsqwmpr8c5sl2zpf763d21sqgii7jgmw0ra1nidv6zl01glb";
+ version = "0.12.1";
+ sha256 = "0c1ydggik4k3vj93bqk53privyblkwhd32jizw25qk5j34axwy69";
buildDepends = [
aeson base base58string binary bitcoin-block bitcoin-script
bitcoin-tx bitcoin-types bytestring hexstring lens lens-aeson text
@@ -25767,18 +25857,19 @@ self: {
}) {};
"bitx-bitcoin" = callPackage
- ({ mkDerivation, aeson, base, bytestring, Decimal, hspec
- , http-conduit, network, record, split, text, time
+ ({ mkDerivation, aeson, base, bytestring, hspec, http-conduit
+ , network, record, scientific, split, text, time
}:
mkDerivation {
pname = "bitx-bitcoin";
- version = "0.1.0.0";
- sha256 = "05k2cwkd9y327c75fhjqwyxhwrwxhalsx724xa0ng5dw3d30icc2";
+ version = "0.2.0.0";
+ sha256 = "1n0hp16rpddm74q2rfldga7vpvvsqfn099qdp8qd5pqh8swkmwq8";
buildDepends = [
- aeson base bytestring Decimal http-conduit network record split
+ aeson base bytestring http-conduit network record scientific split
text time
];
testDepends = [ aeson base bytestring hspec record time ];
+ homepage = "https://github.com/tebello-thejane/bitx-haskell";
description = "A Haskell library for working with the BitX bitcoin exchange";
license = stdenv.lib.licenses.publicDomain;
}) {};
@@ -26323,23 +26414,25 @@ self: {
}) {};
"bloodhound" = callPackage
- ({ mkDerivation, aeson, base, bytestring, conduit, containers
- , directory, doctest, doctest-prop, filepath, hspec, http-client
- , http-types, QuickCheck, semigroups, text, time
- , unordered-containers, vector
+ ({ mkDerivation, aeson, base, bytestring, containers
+ , data-default-class, directory, doctest, doctest-prop, exceptions
+ , filepath, hspec, http-client, http-types, mtl, QuickCheck
+ , quickcheck-properties, semigroups, text, time, transformers
+ , unordered-containers, uri-bytestring, vector
}:
mkDerivation {
pname = "bloodhound";
- version = "0.5.0.1";
- sha256 = "1wvqj8fz3b6jvhmmi3calx6fsqjyvcpznks67bd0iiz9z0igh0ha";
+ version = "0.6.0.0";
+ sha256 = "0qybsmfkip5cjanmhj2av4rl5hig6x4wn97cmlajhszqd5ddsis9";
buildDepends = [
- aeson base bytestring conduit containers http-client http-types
- semigroups text time vector
+ aeson base bytestring containers data-default-class exceptions
+ http-client http-types mtl semigroups text time transformers
+ uri-bytestring vector
];
testDepends = [
aeson base containers directory doctest doctest-prop filepath hspec
- http-client http-types QuickCheck semigroups text time
- unordered-containers vector
+ http-client http-types mtl QuickCheck quickcheck-properties
+ semigroups text time unordered-containers vector
];
jailbreak = true;
homepage = "https://github.com/bitemyapp/bloodhound";
@@ -26691,6 +26784,7 @@ self: {
testDepends = [
base directory doctest filepath prelude-extras transformers vector
];
+ jailbreak = true;
homepage = "http://github.com/ekmett/bound/";
description = "Making de Bruijn Succ Less";
license = stdenv.lib.licenses.bsd3;
@@ -26814,6 +26908,17 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "break" = callPackage
+ ({ mkDerivation, base, mtl, transformers }:
+ mkDerivation {
+ pname = "break";
+ version = "1.0.0";
+ sha256 = "15fqdha71i4ziv0ra8v2mfp0fviwgs27xlsvc0chb8icqf33y22m";
+ buildDepends = [ base mtl transformers ];
+ description = "Break from a loop";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"breakout" = callPackage
({ mkDerivation, base, haskgame, mtl, SDL }:
mkDerivation {
@@ -27321,22 +27426,22 @@ self: {
"bustle" = callPackage
({ mkDerivation, base, bytestring, cairo, containers, dbus
- , directory, filepath, glib, gtk, hgettext, HUnit, mtl, pango
+ , directory, filepath, gio, glib, gtk3, hgettext, HUnit, mtl, pango
, parsec, pcap, process, QuickCheck, setlocale, test-framework
, test-framework-hunit, text, time
}:
mkDerivation {
pname = "bustle";
- version = "0.4.8";
- sha256 = "0ra4hvym5f4w8hy7p11apb5n0pdsq5iv56wab513dhb75562ipcq";
+ version = "0.5.0";
+ sha256 = "0wj3abvkpalr40zyqwxi2bwgrfzmnjjg7y577qj2fzv8l5bl2mn0";
isLibrary = false;
isExecutable = true;
buildDepends = [
- base bytestring cairo containers dbus directory filepath glib gtk
- hgettext mtl pango parsec pcap process setlocale text time
+ base bytestring cairo containers dbus directory filepath gio glib
+ gtk3 hgettext mtl pango parsec pcap process setlocale text time
];
testDepends = [
- base bytestring cairo containers dbus directory filepath gtk
+ base bytestring cairo containers dbus directory filepath gtk3
hgettext HUnit mtl pango pcap QuickCheck setlocale test-framework
test-framework-hunit text
];
@@ -27576,30 +27681,28 @@ self: {
}:
mkDerivation {
pname = "bytestring-handle";
- version = "0.1.0.2";
- sha256 = "1nnqqcl9zp14q49jwcxhbm85hxk48higpr63qs675802sz0fs01v";
+ version = "0.1.0.3";
+ sha256 = "0dakwnpymxj2nghqsnq09862czby8hy0xl8m74yzqdnd9ky22g0z";
buildDepends = [ base bytestring ];
testDepends = [
base bytestring HUnit QuickCheck test-framework
test-framework-hunit test-framework-quickcheck2
];
- jailbreak = true;
homepage = "http://hub.darcs.net/ganesh/bytestring-handle";
description = "ByteString-backed Handles";
license = stdenv.lib.licenses.bsd3;
}) {};
"bytestring-lexing" = callPackage
- ({ mkDerivation, alex, array, base, bytestring }:
+ ({ mkDerivation, base, bytestring }:
mkDerivation {
pname = "bytestring-lexing";
- version = "0.4.3.3";
- sha256 = "1gfbmxr91glzxmbl57f3ij9mapdfxal8pql0s7g3v4qxf7km2pq0";
- buildDepends = [ array base bytestring ];
- buildTools = [ alex ];
+ version = "0.5.0.2";
+ sha256 = "0wrzniawhgpphc6yx1v972gyqxdbv0pizaz9bafahrshyb9svy81";
+ buildDepends = [ base bytestring ];
homepage = "http://code.haskell.org/~wren/";
description = "Parse and produce literals efficiently from strict or lazy bytestrings";
- license = stdenv.lib.licenses.bsd3;
+ license = stdenv.lib.licenses.bsd2;
}) {};
"bytestring-mmap" = callPackage
@@ -27660,10 +27763,11 @@ self: {
}:
mkDerivation {
pname = "bytestring-read";
- version = "0.3.0";
- sha256 = "19bq478066chy35fnfjq5bg2f196zl6qi2dssqwlr9bivgvk434g";
+ version = "0.3.1";
+ sha256 = "0df6mb5fhfd1kgah5gv4q4ykxvl0y8hbqrdvm17nh33cxj2csj00";
buildDepends = [ base bytestring types-compat ];
testDepends = [ base bytestring doctest tasty tasty-quickcheck ];
+ jailbreak = true;
homepage = "https://github.com/philopon/bytestring-read";
description = "fast ByteString to number converting library";
license = stdenv.lib.licenses.mit;
@@ -27823,8 +27927,8 @@ self: {
({ mkDerivation, base, ghc-prim }:
mkDerivation {
pname = "c-storable-deriving";
- version = "0.1.1";
- sha256 = "19scaffyinyblc3vw3ga22j2z81gd7l2l3nnrsy3k9nsal1rbz3z";
+ version = "0.1.2";
+ sha256 = "0cdy3fy8lpz5layc0qzixfpbx2jksl9smrf012l5rpl994dwc9x1";
buildDepends = [ base ghc-prim ];
homepage = "https://github.com/maurer/c-storable-deriving";
description = "Generate C-like storable instances from datatypes";
@@ -27956,8 +28060,8 @@ self: {
}:
mkDerivation {
pname = "cabal-bounds";
- version = "0.9.3";
- sha256 = "0r8ayxsfx7z4hivknshj2sybssn3hjwprxpyqw4yv3w26gv7d82j";
+ version = "0.9.4";
+ sha256 = "1l1nqf8878kmmdc5ssrpn52cszn9w0ym70pjjbaprpa1c7mdbziy";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -28041,8 +28145,8 @@ self: {
}:
mkDerivation {
pname = "cabal-debian";
- version = "4.27.2";
- sha256 = "1dmxs06x82pb0x4cyf5lhhgjf5mf0yx2yzl5r6g69awlkq5ylalz";
+ version = "4.29";
+ sha256 = "1kx8mivm2vm0bgnrzvccnd2x3ww913h64bwcawzpbcgjv7cpihlj";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -28163,20 +28267,20 @@ self: {
"cabal-helper" = callPackage
({ mkDerivation, base, bytestring, Cabal, data-default, directory
- , filepath, ghc-prim, mtl, process, template-haskell, temporary
- , transformers
+ , extra, filepath, ghc-prim, mtl, process, template-haskell
+ , temporary, transformers, unix
}:
mkDerivation {
pname = "cabal-helper";
- version = "0.3.4.0";
- sha256 = "1c96zwiz7jn55ijjjy8ip5axk7g0mv7b10bs25b5y3z7iqbblw6c";
+ version = "0.3.5.0";
+ sha256 = "02qzji8jzbg19pmhmqg0kylvmm0libq7v99rws67bh015gb829kk";
isLibrary = true;
isExecutable = true;
buildDepends = [
base bytestring Cabal data-default directory filepath ghc-prim mtl
process template-haskell temporary transformers
];
- testDepends = [ base ];
+ testDepends = [ base extra unix ];
description = "Simple interface to Cabal's configuration state used by ghc-mod";
license = stdenv.lib.licenses.agpl3;
}) {};
@@ -28689,9 +28793,9 @@ self: {
mkDerivation {
pname = "cabal2nix";
version = "1.73";
- revision = "4";
+ revision = "5";
sha256 = "1nskcr8k5a8wm9q5is0b1kww574q2nq45f16agya8z44hgk97xiv";
- editedCabalFile = "29ac70f26f4996e06945649693d71c217ed9e5f9b3ec72637c13153961d8f2d9";
+ editedCabalFile = "54866b8081ddfc72761c1f38cc96df6782682058cd09b465300562910f57e2ea";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -29617,20 +29721,22 @@ self: {
"cassava" = callPackage
({ mkDerivation, array, attoparsec, base, blaze-builder, bytestring
- , containers, deepseq, HUnit, QuickCheck, test-framework
+ , containers, deepseq, hashable, HUnit, QuickCheck, test-framework
, test-framework-hunit, test-framework-quickcheck2, text
, unordered-containers, vector
}:
mkDerivation {
pname = "cassava";
- version = "0.4.2.4";
- sha256 = "1vf42v4n55i39zk5dimzk9z0l0jzyp9w9vhgrvzmi0f7nhfbv08a";
+ version = "0.4.3.0";
+ revision = "1";
+ sha256 = "0pwcxv1mdn0p6hw2w5fiw4w75mnxphngzj62jw3nbd80bswdp2x3";
+ editedCabalFile = "6410ddebd594ccd8c068cbfb6b064ac43bcebb48fb74cbc25078c89f55e051a7";
buildDepends = [
array attoparsec base blaze-builder bytestring containers deepseq
- text unordered-containers vector
+ hashable text unordered-containers vector
];
testDepends = [
- attoparsec base bytestring HUnit QuickCheck test-framework
+ attoparsec base bytestring hashable HUnit QuickCheck test-framework
test-framework-hunit test-framework-quickcheck2 text
unordered-containers vector
];
@@ -29677,6 +29783,7 @@ self: {
homepage = "https://github.com/pjones/cassava-streams";
description = "io-streams interface for the cassava CSV library";
license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"cassette" = callPackage
@@ -29758,10 +29865,10 @@ self: {
({ mkDerivation, base, template-haskell }:
mkDerivation {
pname = "catamorphism";
- version = "0.5.0.1";
- sha256 = "1zdjsd6dqkcpnm8w6macn0v5y48nycc4g2i4rz3gg57v1hlyqrh6";
+ version = "0.5.1.0";
+ sha256 = "1lhqdr0l3wc59ms1i1xmwp6iy4n4xrd8pi0an0n0jgxw5j2sfbkq";
buildDepends = [ base template-haskell ];
- homepage = "http://github.com/frerich/catamorphism";
+ homepage = "https://github.com/frerich/catamorphism";
description = "A package exposing a helper function for generating catamorphisms";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -30156,8 +30263,8 @@ self: {
}:
mkDerivation {
pname = "cf";
- version = "0.3";
- sha256 = "06r289lb3aq9wh2xggpg7pbxf60wkz1fmdy7ibyawa1sxpprrs07";
+ version = "0.4";
+ sha256 = "172nm38gvjriznnyks958bfzwd2zy59662i6zjzvj3nr0kdkiiap";
buildDepends = [ base ];
testDepends = [
base QuickCheck test-framework test-framework-quickcheck2
@@ -30530,31 +30637,29 @@ self: {
"chatter" = callPackage
({ mkDerivation, array, base, bytestring, cereal, containers
- , deepseq, directory, filepath, fullstop, ghc-prim, HUnit, mbox
- , MonadRandom, parsec, QuickCheck, quickcheck-instances
- , random-shuffle, regex-base, regex-tdfa, regex-tdfa-text, safe
- , split, test-framework, test-framework-hunit
+ , deepseq, directory, filepath, fullstop, HUnit, mbox, MonadRandom
+ , parsec, QuickCheck, quickcheck-instances, random-shuffle
+ , regex-tdfa, regex-tdfa-text, test-framework, test-framework-hunit
, test-framework-quickcheck2, test-framework-skip, text, tokenize
, transformers, zlib
}:
mkDerivation {
pname = "chatter";
- version = "0.5.0.1";
- sha256 = "0saavfnxd6l6w3ybvdmi14ia06ssc4lndb0ba8hhyqb3qzz7l7zs";
+ version = "0.5.0.2";
+ sha256 = "1nbdc4np4hmvnsh1rfpldi2j1wm1klmfm9szi2kz9fa8g8n3kxxl";
isLibrary = true;
isExecutable = true;
buildDepends = [
array base bytestring cereal containers deepseq directory filepath
- fullstop ghc-prim mbox MonadRandom parsec QuickCheck
- quickcheck-instances random-shuffle regex-base regex-tdfa
- regex-tdfa-text safe split text tokenize transformers zlib
+ fullstop mbox MonadRandom parsec QuickCheck quickcheck-instances
+ random-shuffle regex-tdfa regex-tdfa-text text tokenize
+ transformers zlib
];
testDepends = [
base cereal containers filepath HUnit parsec QuickCheck
quickcheck-instances test-framework test-framework-hunit
test-framework-quickcheck2 test-framework-skip text tokenize
];
- jailbreak = true;
homepage = "http://github.com/creswick/chatter";
description = "A library of simple NLP algorithms";
license = stdenv.lib.licenses.bsd3;
@@ -31378,22 +31483,23 @@ self: {
"clash-ghc" = callPackage
({ mkDerivation, array, base, bifunctors, bytestring, clash-lib
- , clash-prelude, clash-systemverilog, clash-vhdl, containers
- , directory, filepath, ghc, ghc-typelits-natnormalise, hashable
- , haskeline, lens, mtl, process, text, transformers
+ , clash-prelude, clash-systemverilog, clash-verilog, clash-vhdl
+ , containers, directory, filepath, ghc, ghc-typelits-natnormalise
+ , hashable, haskeline, lens, mtl, process, text, transformers
, unbound-generics, unix, unordered-containers
}:
mkDerivation {
pname = "clash-ghc";
- version = "0.5.6";
- sha256 = "0x538nxibz4hiyij1s9ljrgjvsmizha4nacszil1530qh7ss34n9";
+ version = "0.5.7";
+ sha256 = "0bia1yqww40prj2n6x4chvfkx05la73056mlpsgilakxwqsab2m7";
isLibrary = false;
isExecutable = true;
buildDepends = [
array base bifunctors bytestring clash-lib clash-prelude
- clash-systemverilog clash-vhdl containers directory filepath ghc
- ghc-typelits-natnormalise hashable haskeline lens mtl process text
- transformers unbound-generics unix unordered-containers
+ clash-systemverilog clash-verilog clash-vhdl containers directory
+ filepath ghc ghc-typelits-natnormalise hashable haskeline lens mtl
+ process text transformers unbound-generics unix
+ unordered-containers
];
jailbreak = true;
homepage = "http://www.clash-lang.org/";
@@ -31411,8 +31517,8 @@ self: {
}:
mkDerivation {
pname = "clash-lib";
- version = "0.5.5";
- sha256 = "0k6k45fhkwrr3azqhp278abf4kr7is67zsqyabf71hdyp68242dx";
+ version = "0.5.6";
+ sha256 = "1dgcnxzk7l7hywv1p268xrm2dfbgfgcvjs5w14vmsfxv1rfzkad0";
buildDepends = [
aeson attoparsec base bytestring clash-prelude concurrent-supply
containers deepseq directory errors fgl filepath hashable lens mtl
@@ -31426,16 +31532,18 @@ self: {
"clash-prelude" = callPackage
({ mkDerivation, base, data-default, doctest, ghc-prim
- , ghc-typelits-natnormalise, Glob, integer-gmp, singletons
- , template-haskell, th-lift
+ , ghc-typelits-natnormalise, Glob, integer-gmp, lens, QuickCheck
+ , singletons, template-haskell, th-lift
}:
mkDerivation {
pname = "clash-prelude";
- version = "0.7.5";
- sha256 = "0li9y6cb56yf28yrma2c1japhl6c4rk0x9d8wnf3wq9n499bj6iv";
+ version = "0.8";
+ revision = "1";
+ sha256 = "0hd8faq69wvm679gyplbzccz3k4iyp1108xm0hc4x7cdrkmg01r1";
+ editedCabalFile = "e549747128c6452eca30da937a03b8d0ff2577466a5a242f50754db3d3f6a648";
buildDepends = [
base data-default ghc-prim ghc-typelits-natnormalise integer-gmp
- singletons template-haskell th-lift
+ lens QuickCheck singletons template-haskell th-lift
];
testDepends = [ base doctest Glob ];
homepage = "http://www.clash-lang.org/";
@@ -31451,6 +31559,7 @@ self: {
version = "0.1.2.1";
sha256 = "1fn5wlg2lmxl6rs2ygnf0m88bgcjf62jpprbp425pqbq6lvhw70w";
buildDepends = [ base clash-prelude QuickCheck ];
+ jailbreak = true;
description = "QuickCheck instances for various types in the CλaSH Prelude";
license = "unknown";
hydraPlatforms = stdenv.lib.platforms.none;
@@ -31462,8 +31571,8 @@ self: {
}:
mkDerivation {
pname = "clash-systemverilog";
- version = "0.5.4";
- sha256 = "1n35k6mmwf8ky99kc22nw5zwkp75pasjs1yx175h46ln3cqlm289";
+ version = "0.5.5";
+ sha256 = "1dks6saxp24xm478bgx2bkzx4qq6yv79f92z8kw6a2y29c3bjfrg";
buildDepends = [
base clash-lib clash-prelude fgl lens mtl text unordered-containers
wl-pprint-text
@@ -31474,14 +31583,31 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "clash-verilog" = callPackage
+ ({ mkDerivation, base, clash-lib, clash-prelude, fgl, lens, mtl
+ , text, unordered-containers, wl-pprint-text
+ }:
+ mkDerivation {
+ pname = "clash-verilog";
+ version = "0.5.5";
+ sha256 = "0wjnjdl9slcrxnd0vz7m6y5jhs6gcaij7f9jjrgfcljq4wmk05rf";
+ buildDepends = [
+ base clash-lib clash-prelude fgl lens mtl text unordered-containers
+ wl-pprint-text
+ ];
+ homepage = "http://www.clash-lang.org/";
+ description = "CAES Language for Synchronous Hardware - Verilog backend";
+ license = stdenv.lib.licenses.bsd2;
+ }) {};
+
"clash-vhdl" = callPackage
({ mkDerivation, base, clash-lib, clash-prelude, fgl, lens, mtl
, text, unordered-containers, wl-pprint-text
}:
mkDerivation {
pname = "clash-vhdl";
- version = "0.5.4";
- sha256 = "1zmbgsvqa6mgz3aj6xpv3daiic57rccbav1c5dnsfjbsp8x2jgnc";
+ version = "0.5.6";
+ sha256 = "02pjy1l3irn67jaqy6sp2a8cjy2sw100kssyd0nxsz9k0imjzizy";
buildDepends = [
base clash-lib clash-prelude fgl lens mtl text unordered-containers
wl-pprint-text
@@ -31529,8 +31655,8 @@ self: {
}:
mkDerivation {
pname = "classy-prelude";
- version = "0.12.0";
- sha256 = "0g72084wnfqam0djpck76bb7dmphpjs1h32w361cqyvgxkyy1prw";
+ version = "0.12.0.1";
+ sha256 = "0ny5cxkzbjhhsmypsp4sjm7nm0jv2l2kysgcphm6j1l3dr0ck6il";
buildDepends = [
base basic-prelude bifunctors bytestring chunked-data containers
dlist enclosed-exceptions exceptions ghc-prim hashable lifted-base
@@ -31619,8 +31745,8 @@ self: {
}:
mkDerivation {
pname = "clckwrks";
- version = "0.23.7";
- sha256 = "0bs7gcbb3xsq4b444jybilfvpxqm9xdwn135fdn1wchbiykqnwba";
+ version = "0.23.8";
+ sha256 = "0inhxyjs12990mngfx2n3m107wxnamgi4gby5lnvai5nz913qgzd";
buildDepends = [
acid-state aeson aeson-qq attoparsec base blaze-html bytestring
cereal containers directory filepath happstack-authenticate
@@ -31634,7 +31760,6 @@ self: {
];
buildTools = [ hsx2hs ];
extraLibraries = [ openssl ];
- jailbreak = true;
homepage = "http://www.clckwrks.com/";
description = "A secure, reliable content management system (CMS) and blogging platform";
license = stdenv.lib.licenses.bsd3;
@@ -31677,6 +31802,7 @@ self: {
text web-plugins
];
buildTools = [ hsx2hs ];
+ jailbreak = true;
homepage = "http://www.clckwrks.com/";
description = "clckwrks.com";
license = stdenv.lib.licenses.bsd3;
@@ -31719,8 +31845,8 @@ self: {
}:
mkDerivation {
pname = "clckwrks-plugin-ircbot";
- version = "0.6.12";
- sha256 = "1pi8qrm71zdszc1fkwyvdx0qnlj4gzsyajw70w4s6sgmn7mgny69";
+ version = "0.6.14";
+ sha256 = "1lrh2929ia6326vf9lyd5jy1a3nnavl8f27f9faw35871p1my1r2";
buildDepends = [
acid-state attoparsec base blaze-html bytestring clckwrks
containers directory filepath happstack-hsp happstack-server hsp
@@ -31728,7 +31854,6 @@ self: {
safecopy text web-plugins web-routes web-routes-th
];
buildTools = [ hsx2hs ];
- jailbreak = true;
homepage = "http://clckwrks.com/";
description = "ircbot plugin for clckwrks";
license = stdenv.lib.licenses.bsd3;
@@ -31769,8 +31894,8 @@ self: {
}:
mkDerivation {
pname = "clckwrks-plugin-page";
- version = "0.3.10";
- sha256 = "0871fz0h3vqwsjrk7pz69nm8gi5ycxnfv1pip8nnf11wfqfcqlgb";
+ version = "0.4.0";
+ sha256 = "0j82xzdgpy97s4xf6vx3an5ssbybcixhasmh0ca9bjmv9iqkjkws";
buildDepends = [
acid-state aeson attoparsec base clckwrks containers directory
filepath happstack-hsp happstack-server hsp hsx2hs ixset mtl
@@ -31779,7 +31904,6 @@ self: {
web-plugins web-routes web-routes-happstack web-routes-th
];
buildTools = [ hsx2hs ];
- jailbreak = true;
homepage = "http://www.clckwrks.com/";
description = "support for CMS/Blogging in clckwrks";
license = stdenv.lib.licenses.bsd3;
@@ -32329,8 +32453,8 @@ self: {
({ mkDerivation, base, bytestring, HUnit, text }:
mkDerivation {
pname = "cmark";
- version = "0.3.3.1";
- sha256 = "0l42l8bpn69zqz3s2jby1blqg7sx7cxmpnpwr8spkmh5vy8c8m5g";
+ version = "0.3.4";
+ sha256 = "0cmrh524s2in66vb51hzfrbxq7z8afh243c8x1378s9hxk0r6xya";
buildDepends = [ base bytestring text ];
testDepends = [ base HUnit text ];
homepage = "https://github.com/jgm/commonmark-hs";
@@ -32553,6 +32677,28 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "codec" = callPackage
+ ({ mkDerivation, aeson, base, binary, binary-bits, bytestring
+ , data-default-class, mtl, template-haskell, text, transformers
+ , unordered-containers
+ }:
+ mkDerivation {
+ pname = "codec";
+ version = "0.1.1";
+ sha256 = "0fkcbdas270gad7d3k40q96w68iwfb8jgi866x3dp4mf8wvsll9k";
+ buildDepends = [
+ aeson base binary binary-bits bytestring data-default-class mtl
+ template-haskell text transformers unordered-containers
+ ];
+ testDepends = [
+ aeson base binary binary-bits bytestring data-default-class mtl
+ template-haskell text transformers unordered-containers
+ ];
+ homepage = "https://github.com/chpatrick/codec";
+ description = "First-class record construction and bidirectional serialization";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"codec-libevent" = callPackage
({ mkDerivation, array, base, binary, binary-strict, bytestring
, containers, parsec, QuickCheck, regex-compat
@@ -32724,8 +32870,8 @@ self: {
}:
mkDerivation {
pname = "coinbase-exchange";
- version = "0.1.0.0";
- sha256 = "0l09gjn0lk7v51s1gw52p0m9i8amhci93qpi98p1r1nlxx09xj3v";
+ version = "0.2.0.0";
+ sha256 = "1x9cgdj38z1zhrx464rj3qhh8rxqs98mfpqfsnn5yill037p1ig8";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -32739,7 +32885,6 @@ self: {
base bytestring http-client-tls http-conduit old-locale tasty
tasty-hunit tasty-quickcheck tasty-th time transformers uuid
];
- jailbreak = true;
description = "Connector library for the coinbase exchange";
license = stdenv.lib.licenses.mit;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -32922,9 +33067,10 @@ self: {
mkDerivation {
pname = "colors";
version = "0.3.0.2";
+ revision = "1";
sha256 = "0gbdqn5wrh9711j5hs5ypbd3w7a3mh37g6aadqiq4m5n7jna6phm";
+ editedCabalFile = "b49946d81e0089d4d80191523839f934802975ede3b9fd9521ead9e591142560";
buildDepends = [ base lens linear profunctors ];
- jailbreak = true;
homepage = "https://github.com/fumieval/colors";
description = "A type for colors";
license = stdenv.lib.licenses.bsd3;
@@ -33038,6 +33184,7 @@ self: {
homepage = "http://www.comp.leeds.ac.uk/sc06r2s/Projects/HaskellCombinatorialProblems";
description = "A number of data structures to represent and allow the manipulation of standard combinatorial problems, used as test problems in computer science";
license = "GPL";
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"combinatorics" = callPackage
@@ -33163,15 +33310,16 @@ self: {
}:
mkDerivation {
pname = "comonad";
- version = "4.2.6";
+ version = "4.2.7";
revision = "1";
- sha256 = "1dspysfyjk74di2wvv7xj8r92acqsynjl5gi3sh8m7hqb122m60i";
- editedCabalFile = "7a617c03c1147d1955930ac77cf2395f853195c2331468822aa58a5813b49556";
+ sha256 = "03h36hr7vgxxyxfp9yc87vahbm3d6chvrkcrjh5abxg6i42aflma";
+ editedCabalFile = "70542238a847c5b973832fa7e5623a76a485df25b36d511bfd5f5116e4014619";
buildDepends = [
base containers contravariant distributive semigroups tagged
transformers transformers-compat
];
testDepends = [ base directory doctest filepath ];
+ jailbreak = true;
homepage = "http://github.com/ekmett/comonad/";
description = "Comonads";
license = stdenv.lib.licenses.bsd3;
@@ -34073,8 +34221,8 @@ self: {
}:
mkDerivation {
pname = "conduit-combinators";
- version = "1.0.0";
- sha256 = "1ibbj3ipkys26np9d791ynpfzgrw3miclcj02bb0ipmvqngm90hv";
+ version = "1.0.1";
+ sha256 = "014n3qhn9flwj43zjp62vagp5df9ll6nkjk1x9qpagni1vf9cbqq";
buildDepends = [
base base16-bytestring base64-bytestring bytestring chunked-data
conduit conduit-extra filepath monad-control mono-traversable
@@ -34172,6 +34320,25 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "conduit-parse" = callPackage
+ ({ mkDerivation, base, conduit, exceptions, hlint, parsers
+ , resourcet, tasty, tasty-hunit, text, transformers
+ }:
+ mkDerivation {
+ pname = "conduit-parse";
+ version = "0.1.0.0";
+ sha256 = "093qc82nrn8ziza1bfp4xnz8k0cpm39k868a3rq4dhah3s40gsv3";
+ buildDepends = [
+ base conduit exceptions parsers text transformers
+ ];
+ testDepends = [
+ base conduit exceptions hlint parsers resourcet tasty tasty-hunit
+ ];
+ homepage = "https://github.com/k0ral/conduit-parse";
+ description = "Parsing framework based on conduit";
+ license = "unknown";
+ }) {};
+
"conduit-resumablesink" = callPackage
({ mkDerivation, base, bytestring, conduit, hspec, transformers
, void
@@ -34428,13 +34595,12 @@ self: {
}:
mkDerivation {
pname = "connection-pool";
- version = "0.1.1.0";
- sha256 = "08mfl5gwbxzkf6dvqvshmzpjy02f46avimw8ss66br2397bi0qj7";
+ version = "0.1.2.0";
+ sha256 = "12nr9vl884yj4yq9dyfc725zi6dw0amp65xlm9hjm7wffz6mc5az";
buildDepends = [
base between data-default-class monad-control network resource-pool
streaming-commons time transformers-base
];
- jailbreak = true;
homepage = "https://github.com/trskop/connection-pool";
description = "Connection pool built on top of resource-pool and streaming-commons";
license = stdenv.lib.licenses.bsd3;
@@ -34554,18 +34720,22 @@ self: {
"consul-haskell" = callPackage
({ mkDerivation, aeson, base, base64-bytestring, bytestring
- , http-client, HUnit, network, tasty, tasty-hunit, text
+ , http-client, http-types, HUnit, lifted-async, lifted-base
+ , monad-control, network, stm, tasty, tasty-hunit, text
, transformers
}:
mkDerivation {
pname = "consul-haskell";
- version = "0.1";
- sha256 = "0i6xq7xd4bikb46mrcabiwwfga25wqcg7z45bh2hbqhf7yq8xjm6";
+ version = "0.2.1";
+ sha256 = "13c3yqn5nsx7r0hkgdwka6fis2ypg54k4damv3c22rdjyids17x7";
buildDepends = [
- aeson base base64-bytestring bytestring http-client network text
+ aeson base base64-bytestring bytestring http-client http-types
+ lifted-async lifted-base monad-control network stm text
transformers
];
- testDepends = [ base http-client HUnit network tasty tasty-hunit ];
+ testDepends = [
+ base http-client HUnit network tasty tasty-hunit text transformers
+ ];
homepage = "https://github.com/alphaHeavy/consul-haskell";
description = "A consul client for Haskell";
license = stdenv.lib.licenses.bsd3;
@@ -35621,21 +35791,6 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
- "cpphs_1_18_9" = callPackage
- ({ mkDerivation, base, directory, old-locale, old-time, polyparse
- }:
- mkDerivation {
- pname = "cpphs";
- version = "1.18.9";
- sha256 = "0bf9p5izkag6iqlpf59znsv8107hg1xghgas4crw2gxai1z7bfq6";
- isLibrary = true;
- isExecutable = true;
- buildDepends = [ base directory old-locale old-time polyparse ];
- homepage = "http://projects.haskell.org/cpphs/";
- description = "A liberalised re-implementation of cpp, the C pre-processor";
- license = "LGPL";
- }) {};
-
"cpphs" = callPackage
({ mkDerivation, base, directory, old-locale, old-time, polyparse
}:
@@ -36282,17 +36437,19 @@ self: {
"cron" = callPackage
({ mkDerivation, attoparsec, base, derive, hspec
- , hspec-expectations, mtl, old-locale, QuickCheck, text, time
- , transformers
+ , hspec-expectations, mtl, mtl-compat, old-locale, QuickCheck, text
+ , time, transformers-compat
}:
mkDerivation {
pname = "cron";
- version = "0.2.5";
- sha256 = "0337dq2fqjikdn2fayad66rq8xyh2y6ywn18fn5q5vvrhmvmyrja";
- buildDepends = [ attoparsec base mtl old-locale text time ];
+ version = "0.3.0";
+ sha256 = "18yadf94bzyhm5nab6lc8zagp39yv5k8cjjakhaxncgipcm30s9k";
+ buildDepends = [
+ attoparsec base mtl mtl-compat old-locale text time
+ ];
testDepends = [
attoparsec base derive hspec hspec-expectations QuickCheck text
- time transformers
+ time transformers-compat
];
homepage = "http://github.com/michaelxavier/cron";
description = "Cron datatypes and Attoparsec parser";
@@ -36300,6 +36457,29 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "cron-compat" = callPackage
+ ({ mkDerivation, attoparsec, base, cron, derive, hspec
+ , hspec-expectations, mtl, mtl-compat, old-locale, QuickCheck, text
+ , time, transformers, transformers-compat
+ }:
+ mkDerivation {
+ pname = "cron-compat";
+ version = "0.2.6";
+ sha256 = "0km70j3xfqvpra9mvbxpvpqd7arjjfcpazmilvmj6kjxk6cw7pfx";
+ buildDepends = [
+ attoparsec base mtl mtl-compat old-locale text time
+ transformers-compat
+ ];
+ testDepends = [
+ attoparsec base cron derive hspec hspec-expectations QuickCheck
+ text time transformers
+ ];
+ jailbreak = true;
+ homepage = "http://github.com/michaelxavier/cron";
+ description = "Cron datatypes and Attoparsec parser";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"cruncher-types" = callPackage
({ mkDerivation, aeson, base, containers, hlint, lens, text }:
mkDerivation {
@@ -36680,8 +36860,8 @@ self: {
}:
mkDerivation {
pname = "cryptol";
- version = "2.2.3";
- sha256 = "0g8xf65v255z8qm30n3d1h4fval763lns14vb36cyrp1gp48rf2i";
+ version = "2.2.4";
+ sha256 = "07aai72kg66skdnbydy25a07124znvrixbw91gk4n9430gsvv26z";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -39771,8 +39951,8 @@ self: {
}:
mkDerivation {
pname = "debian-build";
- version = "0.7.1.0";
- sha256 = "0hzvv6aazpf7r75yygcqy1ldz3j9shs6spv71nzn040rny67cdll";
+ version = "0.7.1.1";
+ sha256 = "0r2f14h0bpbq861jfa0rgp0y87nq142f80dyjzyzzrdwc8szj120";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -40232,6 +40412,24 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "delta" = callPackage
+ ({ mkDerivation, base, containers, directory, filepath, fs-events
+ , sodium, time
+ }:
+ mkDerivation {
+ pname = "delta";
+ version = "0.1.0.1";
+ sha256 = "0kjii2hqwzzsb8i09547y0qxrdak3xkhgv7dqahbpypzh8hldgzf";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [
+ base containers directory filepath fs-events sodium time
+ ];
+ homepage = "https://github.com/kryoxide/delta";
+ description = "A library for detecting file changes";
+ license = stdenv.lib.licenses.gpl3;
+ }) {};
+
"delta-h" = callPackage
({ mkDerivation, base, binary, bytestring, containers, monad-atom
, nlp-scores, text
@@ -42550,8 +42748,8 @@ self: {
}:
mkDerivation {
pname = "dns";
- version = "1.4.5";
- sha256 = "13s9ysa5hkjjc2a5290mbpnrk2mjg3w01mib62p65rywz26yc7g5";
+ version = "2.0.0";
+ sha256 = "1jq12jdidgz9nrcpnr362n6rwvxywd5v7j4fi18bqaq2f67ybjay";
buildDepends = [
attoparsec base binary blaze-builder bytestring conduit
conduit-extra containers iproute mtl network random resourcet
@@ -42753,10 +42951,8 @@ self: {
}:
mkDerivation {
pname = "doctest";
- version = "0.9.13";
- revision = "1";
- sha256 = "0xl570ay5bw1rpd1aw59c092rnwjbp9qykh2rhpxyvl333p8mg00";
- editedCabalFile = "592ab6d62eca8a0b43930f15c8fb653c54d60983bd232ecc505bd5a5aebe6f7f";
+ version = "0.10.0";
+ sha256 = "161k9brapz6hbwl3naar07kpfsgqp4b52i5nfsbxsqa2a9al40kb";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -43097,6 +43293,24 @@ self: {
license = stdenv.lib.licenses.gpl3;
}) {};
+ "dozens" = callPackage
+ ({ mkDerivation, aeson, base, bytestring, data-default-class
+ , http-client, http-types, reflection, scientific, text
+ , transformers
+ }:
+ mkDerivation {
+ pname = "dozens";
+ version = "0.1.1";
+ sha256 = "1hvsdc69ag4x8rp2pzr3cxjfbl4fh9bdj4bwlkfvpr755qdi45ky";
+ buildDepends = [
+ aeson base bytestring data-default-class http-client http-types
+ reflection scientific text transformers
+ ];
+ homepage = "https://github.com/philopon/apiary";
+ description = "dozens api library";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"dph-base" = callPackage
({ mkDerivation, array, base, ghc-prim, pretty, random, vector }:
mkDerivation {
@@ -43385,8 +43599,8 @@ self: {
}:
mkDerivation {
pname = "dsh-sql";
- version = "0.2.0.1";
- sha256 = "0vr9wsad74735py2i2kqwqi4phf49ksw3d4w89jlcgi6xpsc02s1";
+ version = "0.2.0.2";
+ sha256 = "00r1wbgbkpnza1jjd14vqr4hwgfkhnz7yivkx4bla5frfdlv5q58";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -43398,6 +43612,7 @@ self: {
];
description = "SQL backend for Database Supported Haskell (DSH)";
license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"dsmc" = callPackage
@@ -44274,8 +44489,8 @@ self: {
({ mkDerivation, base, edenmodules, parallel }:
mkDerivation {
pname = "edenskel";
- version = "2.0.0.2";
- sha256 = "0dkvbdy04w4zbbc3q11hzzg3h5d8azka11yiiz3rvy1nkhp9wv5l";
+ version = "2.1.0.0";
+ sha256 = "1bf5zw1x4f6a801ig2b8b84kbnmp0asn804gkm18v9fjcchz3j9q";
buildDepends = [ base edenmodules parallel ];
description = "Semi-explicit parallel programming skeleton library";
license = stdenv.lib.licenses.bsd3;
@@ -44804,8 +45019,8 @@ self: {
}:
mkDerivation {
pname = "ekg-push";
- version = "0.0.2";
- sha256 = "1z41x3i7hvrnca3clrrz62kah3a4lik0f3gxhw3vnyqgszzb46l5";
+ version = "0.0.3";
+ sha256 = "1yxp0s3i87zc205bqkw8arq8n0y225gin94x98csldb9rd0k0s5y";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -44845,12 +45060,11 @@ self: {
}:
mkDerivation {
pname = "ekg-statsd";
- version = "0.2.0.2";
- sha256 = "1jblrhwpv579d51i66bin9zxmwkl899lxwygg4qqpm3cnx5vf859";
+ version = "0.2.0.3";
+ sha256 = "02sknwz5cqwy5byqjiyc6nfppmbmfnxndp3dcs4lz276221h91hn";
buildDepends = [
base bytestring ekg-core network text time unordered-containers
];
- jailbreak = true;
homepage = "https://github.com/tibbe/ekg-statsd";
description = "Push metrics to statsd";
license = stdenv.lib.licenses.bsd3;
@@ -45032,8 +45246,8 @@ self: {
}:
mkDerivation {
pname = "elm-init";
- version = "0.1.2.0";
- sha256 = "0s80x6r2h5cwng6x15xmwgpnjv0qgp360g11g2k3hsc5y8fvgmkd";
+ version = "0.1.2.1";
+ sha256 = "0x5p5jwxz07m515421xpcw777lgc3bx40mnl0y9fdw2gz4f3svs2";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -45042,6 +45256,7 @@ self: {
];
description = "Set up basic structure for an elm project";
license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"elm-make" = callPackage
@@ -45421,10 +45636,9 @@ self: {
({ mkDerivation, base, between, transformers }:
mkDerivation {
pname = "endo";
- version = "0.1.0.2";
- sha256 = "1wqg0mcaf55wa70wjgd6n0gw56rghz6p76lc6kw4aki969h12xrl";
+ version = "0.2.0.0";
+ sha256 = "1gqw14nadw1cb49m251swly35gjkb2xhqi0cqhm17ww8r13mzp31";
buildDepends = [ base between transformers ];
- jailbreak = true;
homepage = "https://github.com/trskop/endo";
description = "Endomorphism utilities";
license = stdenv.lib.licenses.bsd3;
@@ -45888,24 +46102,6 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
- "equivalence_0_2_5" = callPackage
- ({ mkDerivation, base, containers, mtl, QuickCheck, STMonadTrans
- , template-haskell, test-framework, test-framework-quickcheck2
- }:
- mkDerivation {
- pname = "equivalence";
- version = "0.2.5";
- sha256 = "014r9v81r7nj5pynfk3wa4lm4hk04123fgxkhb9a945wi6d9m5h3";
- buildDepends = [ base containers mtl STMonadTrans ];
- testDepends = [
- base containers mtl QuickCheck STMonadTrans template-haskell
- test-framework test-framework-quickcheck2
- ];
- homepage = "https://bitbucket.org/paba/equivalence/";
- description = "Maintaining an equivalence relation implemented as union-find using STT";
- license = stdenv.lib.licenses.bsd3;
- }) {};
-
"equivalence" = callPackage
({ mkDerivation, base, containers, mtl, QuickCheck, STMonadTrans
, template-haskell, test-framework, test-framework-quickcheck2
@@ -46239,6 +46435,7 @@ self: {
persistent persistent-sqlite persistent-template QuickCheck
resourcet text transformers
];
+ jailbreak = true;
homepage = "https://github.com/prowdsponsor/esqueleto";
description = "Type-safe EDSL for SQL queries on persistent backends";
license = stdenv.lib.licenses.bsd3;
@@ -46335,6 +46532,25 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "ether" = callPackage
+ ({ mkDerivation, base, mtl, newtype-generics, QuickCheck, tasty
+ , tasty-quickcheck, template-haskell, transformers
+ }:
+ mkDerivation {
+ pname = "ether";
+ version = "0.2.1.0";
+ sha256 = "1iwi3whaxnpwfdghw1rli9dxqh1c28hhxkdvl4wslj0vc014h3di";
+ buildDepends = [
+ base mtl newtype-generics template-haskell transformers
+ ];
+ testDepends = [
+ base mtl QuickCheck tasty tasty-quickcheck transformers
+ ];
+ homepage = "https://int-index.github.io/ether/";
+ description = "Monad transformers and classes";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"ethereum-client-haskell" = callPackage
({ mkDerivation, ansi-wl-pprint, array, base, base16-bytestring
, binary, bytestring, cmdargs, containers, cryptohash, data-default
@@ -46545,13 +46761,12 @@ self: {
}:
mkDerivation {
pname = "eventstore";
- version = "0.7.2.1";
- sha256 = "0zhasybpvmi3f0kb2pipb03jnv4d710gcr6mphszgkj5179wvad2";
+ version = "0.8.0.0";
+ sha256 = "0p1z7xs3412s2hnv7pc18y1gx65p5hf09038n96vl22kvc9d84ww";
buildDepends = [
aeson async attoparsec base bytestring cereal containers network
protobuf random sodium stm text time unordered-containers uuid
];
- jailbreak = true;
homepage = "http://github.com/YoEight/eventstore";
description = "EventStore TCP Client";
license = stdenv.lib.licenses.bsd3;
@@ -47530,6 +47745,7 @@ self: {
base bytestring containers foldl lens parsec pipes pipes-bytestring
pipes-group pipes-text split text
];
+ jailbreak = true;
homepage = "https://github.com/GregorySchwartz/fasta";
description = "A simple, mindless parser for fasta files";
license = stdenv.lib.licenses.gpl2;
@@ -47680,6 +47896,18 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "fay-geoposition" = callPackage
+ ({ mkDerivation, fay-base, fay-text }:
+ mkDerivation {
+ pname = "fay-geoposition";
+ version = "0.1.0.1";
+ sha256 = "1qmkwfqgvj6a8fan1l3i18ggpl00vrfd2mhqj13g0gh9yhvgxv1q";
+ buildDepends = [ fay-base fay-text ];
+ homepage = "https://github.com/victoredwardocallaghan/fay-geoposition";
+ description = "W3C compliant implementation of GeoPosition API";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"fay-hsx" = callPackage
({ mkDerivation, fay-base, fay-jquery }:
mkDerivation {
@@ -47752,8 +47980,8 @@ self: {
}:
mkDerivation {
pname = "fb";
- version = "1.0.10";
- sha256 = "11h2z8idndhvm1ijp6qylaqyg173qk1rybv9v0d73s2sq7jxbcx7";
+ version = "1.0.11";
+ sha256 = "19kvsc6ap56b3h1z6wnjqmxgnqs7jqlhd3zx08h6nxkip3ddnzh5";
buildDepends = [
aeson attoparsec base base16-bytestring base64-bytestring
bytestring cereal conduit conduit-extra crypto-api cryptohash
@@ -47779,6 +48007,7 @@ self: {
version = "0.3.4";
sha256 = "07hrifzwvv7fzqh70igfbxzn854yvyx7406s8byn0arhmp21ka3b";
buildDepends = [ base cereal fb persistent text time ];
+ jailbreak = true;
homepage = "https://github.com/prowdsponsor/fb-persistent";
description = "Provides Persistent instances to Facebook types";
license = stdenv.lib.licenses.bsd3;
@@ -48088,17 +48317,25 @@ self: {
}) {};
"feldspar-signal" = callPackage
- ({ mkDerivation, base }:
+ ({ mkDerivation, base, base-compat, feldspar-compiler
+ , feldspar-compiler-shim, feldspar-language, imperative-edsl
+ , mainland-pretty, monadic-edsl-priv
+ }:
mkDerivation {
pname = "feldspar-signal";
- version = "0.0.0.1";
- sha256 = "16brcdnbk4ykribgw5jix7k6qca2rxqms1hnljmirs0b8ldyflgx";
- buildDepends = [ base ];
+ version = "0.0.1.0";
+ sha256 = "147y0fy5pzagk8pm8way8qnxv42mn5qh8kmzjf02laydzxrwvpxd";
+ buildDepends = [
+ base base-compat feldspar-compiler feldspar-compiler-shim
+ feldspar-language imperative-edsl mainland-pretty monadic-edsl-priv
+ ];
jailbreak = true;
homepage = "https://github.com/markus-git/feldspar-signal";
description = "Signal Processing extension for Feldspar";
license = stdenv.lib.licenses.bsd3;
- }) {};
+ broken = true;
+ }) { feldspar-compiler-shim = null; imperative-edsl = null;
+ monadic-edsl-priv = null;};
"fen2s" = callPackage
({ mkDerivation, api-opentheory-unicode, base, opentheory-unicode
@@ -48174,19 +48411,19 @@ self: {
}) {};
"fficxx" = callPackage
- ({ mkDerivation, base, bytestring, Cabal, containers, directory
- , either, errors, filepath, hashable, HStringTemplate, lens, mtl
- , process, pureMD5, split, template-haskell, transformers
- , unordered-containers
+ ({ mkDerivation, base, bytestring, Cabal, containers, data-default
+ , directory, either, errors, filepath, hashable, HStringTemplate
+ , lens, mtl, process, pureMD5, split, template-haskell
+ , transformers, unordered-containers
}:
mkDerivation {
pname = "fficxx";
- version = "0.2";
- sha256 = "0512v9xhli6qdz46gvn8lj15rp30919pf982fjcgklw22qmci69q";
+ version = "0.2.1";
+ sha256 = "1vjkwp0krs2762ww7vkl1g0dpaw6ifba7acjndmqbnvm3yl0ha0d";
buildDepends = [
- base bytestring Cabal containers directory either errors filepath
- hashable HStringTemplate lens mtl process pureMD5 split
- template-haskell transformers unordered-containers
+ base bytestring Cabal containers data-default directory either
+ errors filepath hashable HStringTemplate lens mtl process pureMD5
+ split template-haskell transformers unordered-containers
];
description = "automatic C++ binding generation";
license = stdenv.lib.licenses.bsd3;
@@ -48197,8 +48434,8 @@ self: {
({ mkDerivation, base }:
mkDerivation {
pname = "fficxx-runtime";
- version = "0.2";
- sha256 = "0czh7in30369c8c4ls3m3r61w6zb1p0p0jy2yi5j9521f61q588a";
+ version = "0.2.1";
+ sha256 = "0hcpc0db4mh3yx8yzbkllq9b04dd1qvr63ppz2qa9nq5zydb5pxk";
buildDepends = [ base ];
description = "Runtime for fficxx-generated library";
license = stdenv.lib.licenses.bsd3;
@@ -48710,8 +48947,8 @@ self: {
}:
mkDerivation {
pname = "fingertree";
- version = "0.1.0.2";
- sha256 = "1krsymv66lnz30hv3j2427vl1wh7vczjb66qviq8mfxgfxf2q8z6";
+ version = "0.1.1.0";
+ sha256 = "1w6x3kp3by5yjmam6wlrf9vap5l5rrqaip0djbrdp0fpf2imn30n";
buildDepends = [ base ];
testDepends = [
base HUnit QuickCheck test-framework test-framework-hunit
@@ -49005,6 +49242,7 @@ self: {
sha256 = "1hlg0rbi2phk7qr7nvjnazg344jqp5p13c3m8v5n01vw9bvjbnir";
buildDepends = [ base deepseq primitive ];
testDepends = [ base doctest filemanip primitive ];
+ jailbreak = true;
description = "Generic vectors with statically known size";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -49400,10 +49638,8 @@ self: {
({ mkDerivation, base, doctest, QuickCheck, template-haskell }:
mkDerivation {
pname = "flow";
- version = "1.0.0";
- revision = "1";
- sha256 = "15vr7d1fyabr9v9r9vnh9m2x0r2i0ggg714cc7r6zxhjbrrc9rbn";
- editedCabalFile = "acf5b2b49db56bf047774bc90e57e6c81c5c4d413849d4cdff9dfaf4c71246ab";
+ version = "1.0.1";
+ sha256 = "11i0p2f8zxpcpssga279hx8vy6a14xykmb8qxyfrrpvd6qg42i8y";
buildDepends = [ base ];
testDepends = [ base doctest QuickCheck template-haskell ];
homepage = "http://taylor.fausak.me/flow/";
@@ -49661,15 +49897,15 @@ self: {
"foldl" = callPackage
({ mkDerivation, base, bytestring, containers, mwc-random
- , primitive, text, transformers, vector
+ , primitive, profunctors, text, transformers, vector
}:
mkDerivation {
pname = "foldl";
- version = "1.0.10";
- sha256 = "04ghbn78hsqp92k9mljpa5xgjrmddwrhj90wb1f1v4lliw1inn9q";
+ version = "1.1.0";
+ sha256 = "184arkpffi2z7dayplc47nvyabzr5sig4zs8hc4lilcklv4q9zn6";
buildDepends = [
- base bytestring containers mwc-random primitive text transformers
- vector
+ base bytestring containers mwc-random primitive profunctors text
+ transformers vector
];
description = "Composable, streaming, and efficient left folds";
license = stdenv.lib.licenses.bsd3;
@@ -50230,10 +50466,9 @@ self: {
({ mkDerivation, base, semigroups }:
mkDerivation {
pname = "fraction";
- version = "0.1.0.3";
- sha256 = "0kjpfqy528s11kfigp27kr5a4xw8kn11mpgjzb6fapdbip6y9579";
+ version = "0.1.0.4";
+ sha256 = "0blvvsc1rbn45nwgmkhd28bdz0awi5mk6h48yqbqy3ajm2gvpvdf";
buildDepends = [ base semigroups ];
- jailbreak = true;
homepage = "http://darcs.wolfgang.jeltsch.info/haskell/fraction";
description = "Fractions";
license = stdenv.lib.licenses.bsd3;
@@ -50346,8 +50581,8 @@ self: {
}:
mkDerivation {
pname = "free-game";
- version = "1.1.80";
- sha256 = "1vpwrviwxib22mkaqmwndzfly8iicr85sh1y914gwp5n83lmkava";
+ version = "1.1.81";
+ sha256 = "1z8l9k70rbcc9jbrnh7xhrnny6wd5l0jfb1a6ki7dnq6m5klivyp";
buildDepends = [
array base boundingboxes colors containers control-bool directory
filepath free freetype2 GLFW-b hashable JuicyPixels
@@ -50592,15 +50827,14 @@ self: {
}:
mkDerivation {
pname = "friday";
- version = "0.2.1.2";
- sha256 = "08w97jbcg5641brd0pf1bnj6mk0lf7xa57v88y686mx6lsl80i3q";
+ version = "0.2.2.0";
+ sha256 = "0cw8mghygbd76l2nf0s1n0n1a7ymh2hv4dfm11hkv0gcdrqrp9fr";
buildDepends = [
base convertible deepseq primitive ratio-int transformers vector
];
testDepends = [
base QuickCheck test-framework test-framework-quickcheck2 vector
];
- jailbreak = true;
homepage = "https://github.com/RaphaelJ/friday";
description = "A functional image processing library for Haskell";
license = stdenv.lib.licenses.gpl3;
@@ -51654,8 +51888,8 @@ self: {
}:
mkDerivation {
pname = "generic-accessors";
- version = "0.1.0.1";
- sha256 = "0lkzwbz2kmv7nl6hlys2iqn5nq1a11n18q2apymp517pvkq3if95";
+ version = "0.4.0";
+ sha256 = "0wpv9i80lai771fws5yg5ri05iskbq2vgar66f72xqwvz3nm44i7";
buildDepends = [ base linear spatial-math ];
testDepends = [
base HUnit QuickCheck test-framework test-framework-hunit
@@ -51991,8 +52225,8 @@ self: {
({ mkDerivation, base, mtl, template-haskell }:
mkDerivation {
pname = "geniplate-mirror";
- version = "0.6.0.7";
- sha256 = "0az8q9jjakbi891ypzm4qg8ys78102zqxqpznk6mm08ng2hzb0wz";
+ version = "0.7.1";
+ sha256 = "0wz7fp0cgf7xn37mmy91scacihnr0fcd6lpbi28yx4qss2hb1m30";
buildDepends = [ base mtl template-haskell ];
homepage = "https://github.com/danr/geniplate";
description = "Use Template Haskell to generate Uniplate-like functions";
@@ -52144,6 +52378,19 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "geom2d" = callPackage
+ ({ mkDerivation, base, ieee754, QuickCheck }:
+ mkDerivation {
+ pname = "geom2d";
+ version = "0.1.3.1";
+ sha256 = "1kz0cdxfc27412vzqv7vcywg9pba177ds6mpwknxlh049vcfrvh5";
+ buildDepends = [ base ieee754 QuickCheck ];
+ testDepends = [ base ieee754 QuickCheck ];
+ description = "package for geometry in euklidean 2d space";
+ license = stdenv.lib.licenses.gpl3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"getemx" = callPackage
({ mkDerivation, base, curl, directory, filepath, haskell98, hxt
, mtl, old-locale, process, time
@@ -52183,8 +52430,8 @@ self: {
}:
mkDerivation {
pname = "getopt-generics";
- version = "0.6.3";
- sha256 = "18d9cbk87gx31fk1bdylllicbnxj2xmb5xzss27amy8xcmlb3qds";
+ version = "0.7.1";
+ sha256 = "0jrnasd9lw7ffim0ski5b1mdislvs27n0i37lcbv51rgsl5wm458";
buildDepends = [
base base-compat base-orphans generics-sop tagged
];
@@ -52192,6 +52439,7 @@ self: {
base base-compat base-orphans generics-sop hspec hspec-expectations
markdown-unlit QuickCheck silently tagged
];
+ homepage = "https://github.com/zalora/getopt-generics#readme";
description = "Simple command line argument parsing";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -52670,6 +52918,18 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "ghc-simple" = callPackage
+ ({ mkDerivation, base, ghc, ghc-paths }:
+ mkDerivation {
+ pname = "ghc-simple";
+ version = "0.1.2.0";
+ sha256 = "0cwirw9j52khkl8fsgw22136nb3nwlbiahvfcds8hryvr64x9vql";
+ buildDepends = [ base ghc ghc-paths ];
+ homepage = "https://github.com/valderman/ghc-simple";
+ description = "Simplified interface to the GHC API";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"ghc-srcspan-plugin" = callPackage
({ mkDerivation, array, base, containers, ghc, hpc }:
mkDerivation {
@@ -52707,6 +52967,19 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "ghc-tcplugins-extra" = callPackage
+ ({ mkDerivation, base, ghc }:
+ mkDerivation {
+ pname = "ghc-tcplugins-extra";
+ version = "0.1";
+ sha256 = "1lr3x3vg5aw8fjwz7skcisqg2hsls16abxp8p4w4940qnw5zznkf";
+ buildDepends = [ base ghc ];
+ jailbreak = true;
+ homepage = "http://www.clash-lang.org/";
+ description = "Utilities for writing GHC type-checker plugins";
+ license = stdenv.lib.licenses.bsd2;
+ }) {};
+
"ghc-time-alloc-prof" = callPackage
({ mkDerivation, attoparsec, base, containers, text, time }:
mkDerivation {
@@ -52722,12 +52995,13 @@ self: {
}) {};
"ghc-typelits-natnormalise" = callPackage
- ({ mkDerivation, base, ghc, tasty, tasty-hunit }:
+ ({ mkDerivation, base, ghc, ghc-tcplugins-extra, tasty, tasty-hunit
+ }:
mkDerivation {
pname = "ghc-typelits-natnormalise";
- version = "0.2.1";
- sha256 = "0dflzqhqax06nx4qc5xw6k1aihny7d2pxg1ldyw1y57mjg44clah";
- buildDepends = [ base ghc ];
+ version = "0.3";
+ sha256 = "169imqq6hch4lamsgz8s3cnszysvxvw9xlgd5bjldq09zvpy7i8r";
+ buildDepends = [ base ghc ghc-tcplugins-extra ];
testDepends = [ base tasty tasty-hunit ];
jailbreak = true;
homepage = "http://www.clash-lang.org/";
@@ -52838,22 +53112,23 @@ self: {
}) {};
"ghcid" = callPackage
- ({ mkDerivation, ansi-terminal, base, cmdargs, directory, extra
- , filepath, process, tasty, tasty-hunit, terminal-size, time
+ ({ mkDerivation, ansi-terminal, base, cmdargs, containers
+ , directory, extra, filepath, fsnotify, process, tasty, tasty-hunit
+ , terminal-size, time
}:
mkDerivation {
pname = "ghcid";
- version = "0.3.6";
- sha256 = "15aasq3f8h5nimgd5zz0mhkflslmcadl2f0srbw4q0462flvmjm8";
+ version = "0.4.2";
+ sha256 = "094ffwwlxg7qgrcgw35rmzincfrwyhxkh6iw9bqdib5l8w9gcr6d";
isLibrary = true;
isExecutable = true;
buildDepends = [
- ansi-terminal base cmdargs directory extra filepath process
- terminal-size time
+ ansi-terminal base cmdargs containers directory extra filepath
+ fsnotify process terminal-size time
];
testDepends = [
- ansi-terminal base cmdargs directory extra filepath process tasty
- tasty-hunit terminal-size time
+ ansi-terminal base cmdargs containers directory extra filepath
+ fsnotify process tasty tasty-hunit terminal-size time
];
homepage = "https://github.com/ndmitchell/ghcid#readme";
description = "GHCi based bare bones IDE";
@@ -53088,7 +53363,7 @@ self: {
, clientsession, conduit, conduit-extra, containers, crypto-api
, cryptohash, curl, data-default, DAV, dbus, directory, dlist, dns
, edit-distance, esqueleto, exceptions, fdo-notify, feed, filepath
- , git, gnupg1, gnutls, hamlet, hinotify, hslogger, http-client
+ , git, gnupg, gnutls, hamlet, hinotify, hslogger, http-client
, http-conduit, http-types, IfElse, json, lsof, MissingH
, monad-control, monad-logger, mtl, network, network-info
, network-multicast, network-protocol-xmpp, network-uri, openssh
@@ -53124,7 +53399,7 @@ self: {
yesod-static
];
buildTools = [
- bup curl git gnupg1 lsof openssh perl rsync wget which
+ bup curl git gnupg lsof openssh perl rsync wget which
];
configureFlags = [ "-fassistant" "-fproduction" ];
preConfigure = "export HOME=$TEMPDIR";
@@ -53136,7 +53411,7 @@ self: {
description = "manage files with git, without checking their contents into git";
license = stdenv.lib.licenses.gpl3;
}) { inherit (pkgs) bup; inherit (pkgs) curl; inherit (pkgs) git;
- inherit (pkgs) gnupg1; inherit (pkgs) lsof;
+ inherit (pkgs) gnupg; inherit (pkgs) lsof;
inherit (pkgs) openssh; inherit (pkgs) perl;
inherit (pkgs) rsync; inherit (pkgs) wget;
inherit (pkgs) which;};
@@ -53550,8 +53825,8 @@ self: {
}:
mkDerivation {
pname = "gitit";
- version = "0.10.6.3";
- sha256 = "1pzxk4zsk1992gsgyi0pfj8x0dggf56v78345jl282hvb2psm371";
+ version = "0.10.7";
+ sha256 = "1gj94z2c2jpdm9bkfnc6wbyhipgbss0j70ql26hn8g3fh1ykcpbj";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -53563,7 +53838,6 @@ self: {
random recaptcha safe SHA split syb tagsoup text time uri url
utf8-string uuid xhtml xml xss-sanitize zlib
];
- jailbreak = true;
homepage = "http://gitit.net";
description = "Wiki using happstack, git or darcs, and pandoc";
license = "GPL";
@@ -53934,12 +54208,12 @@ self: {
}) {};
"gll" = callPackage
- ({ mkDerivation, array, base, containers }:
+ ({ mkDerivation, array, base, containers, TypeCompose }:
mkDerivation {
pname = "gll";
- version = "0.1.0.1";
- sha256 = "09f5clmvn8icgsw73ysyalspy07llbg6lbiqidb4lvmznhg38rvv";
- buildDepends = [ array base containers ];
+ version = "0.2.0.3";
+ sha256 = "1w2z5071idac1jn367dymphqvayd580jlnhapmfrd3s40b6z6xaf";
+ buildDepends = [ array base containers TypeCompose ];
description = "GLL parser with simple combinator interface";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -55078,12 +55352,15 @@ self: {
}) {};
"graph-wrapper" = callPackage
- ({ mkDerivation, array, base, containers }:
+ ({ mkDerivation, array, base, containers, deepseq, hspec
+ , QuickCheck
+ }:
mkDerivation {
pname = "graph-wrapper";
- version = "0.2.4.4";
- sha256 = "0ks4mj1f3ky8h8p9kc1djslbzs2vvlh9frab8jl09x63b15f8xzd";
+ version = "0.2.5.1";
+ sha256 = "04z1qbsf1c31r0mhn8bgr8hisffxacq3j61y4fym28idr8zqaqc3";
buildDepends = [ array base containers ];
+ testDepends = [ array base containers deepseq hspec QuickCheck ];
homepage = "https://github.com/soenkehahn/graph-wrapper";
description = "A wrapper around the standard Data.Graph with a less awkward interface";
license = stdenv.lib.licenses.bsd3;
@@ -55769,6 +56046,22 @@ self: {
license = stdenv.lib.licenses.lgpl21;
}) { inherit (pkgs.gnome) gtk;};
+ "gtk-helpers" = callPackage
+ ({ mkDerivation, array, base, gio, glib, gtk, mtl, process
+ , template-haskell
+ }:
+ mkDerivation {
+ pname = "gtk-helpers";
+ version = "0.0.7";
+ sha256 = "0cx43z79r77ksicgz4ajg8b4hhllyfadcb46zdh6lg088zsgc6v7";
+ buildDepends = [
+ array base gio glib gtk mtl process template-haskell
+ ];
+ homepage = "http://keera.es/blog/community";
+ description = "A collection of auxiliary operations and widgets related to Gtk";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"gtk-jsinput" = callPackage
({ mkDerivation, base, gtk, json, transformers }:
mkDerivation {
@@ -56470,8 +56763,8 @@ self: {
}:
mkDerivation {
pname = "hPDB";
- version = "1.2.0.3";
- sha256 = "1lciijgn137gmi190if41akj4pv9030rbbvys5lfh4q5kk8p2dsp";
+ version = "1.2.0.4";
+ sha256 = "0fzr6y19x7c47y3jl68zcrjnlc8j3b0xnvvrpmqm15qznlrdh41s";
buildDepends = [
AC-Vector base bytestring containers deepseq directory ghc-prim
iterable mmap mtl Octree parallel QuickCheck tagged
@@ -58112,6 +58405,7 @@ self: {
base containers grid HUnit QuickCheck test-framework
test-framework-hunit test-framework-quickcheck2
];
+ jailbreak = true;
homepage = "https://github.com/timjb/halma";
description = "Library implementing Halma rules";
license = stdenv.lib.licenses.mit;
@@ -59060,13 +59354,12 @@ self: {
}:
mkDerivation {
pname = "happy-meta";
- version = "0.2.0.7";
- sha256 = "12599233lh0ffmvlim0gs5jzg8lly1g11i1cg44lb37bz3l7psh9";
+ version = "0.2.0.8";
+ sha256 = "0hnj039vspqvym70c59y80ygb8ciz5bf18sqm0dbvzr5v2mixbag";
buildDepends = [
array base containers haskell-src-meta mtl template-haskell
];
buildTools = [ happy ];
- jailbreak = true;
description = "Quasi-quoter for Happy parsers";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -61784,6 +62077,31 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "haverer" = callPackage
+ ({ mkDerivation, base, basic-prelude, containers, errors, lens
+ , MonadRandom, mtl, random-shuffle, tasty, tasty-hunit
+ , tasty-quickcheck, text
+ }:
+ mkDerivation {
+ pname = "haverer";
+ version = "0.3.0.0";
+ sha256 = "1p4llwjab7h2zg10585jp5a5bfrzmmkziq7in164wk15rb2z5y0p";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [
+ base basic-prelude containers errors lens MonadRandom mtl
+ random-shuffle tasty tasty-quickcheck text
+ ];
+ testDepends = [
+ base basic-prelude containers errors mtl random-shuffle tasty
+ tasty-hunit tasty-quickcheck text
+ ];
+ jailbreak = true;
+ description = "Implementation of the rules of Love Letter";
+ license = stdenv.lib.licenses.asl20;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"hawitter" = callPackage
({ mkDerivation, base, base64-string, bytestring, clock, containers
, gconf, glade, gtk, hoauth, HTTP, json, mtl, network, old-locale
@@ -62717,6 +63035,7 @@ self: {
sha256 = "1g4nf361qfjyymwpyiiq0qk5brrsr4wz1pncij69pwda919b3j6b";
buildDepends = [ base ];
testDepends = [ base directory doctest filepath ];
+ jailbreak = true;
homepage = "http://github.com/ekmett/heaps/";
description = "Asymptotically optimal Brodal/Okasaki heaps";
license = stdenv.lib.licenses.bsd3;
@@ -62773,8 +63092,8 @@ self: {
}:
mkDerivation {
pname = "hedis";
- version = "0.6.5";
- sha256 = "1kn8i49yxms1bpjwpy4m8vyycgi755zvy4zc66w068nmnd1kiykh";
+ version = "0.6.7";
+ sha256 = "181anz8f2qi08f96ns0kxy09y18q4854brdycwhdij5yn7fl9kdg";
buildDepends = [
attoparsec base BoundedChan bytestring bytestring-lexing mtl
network resource-pool time vector
@@ -62903,8 +63222,8 @@ self: {
}:
mkDerivation {
pname = "hein";
- version = "0.1.0.4";
- sha256 = "0agg7nsnhzg3ngiawa9899qg2pwa39dw6rkivdslsv2i67six832";
+ version = "0.1.0.5";
+ sha256 = "0z3c9pvhnfx9zizzwkyawvzvs4zl7i5w5zkrjpax8rkrh8ai1060";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -64355,7 +64674,9 @@ self: {
mkDerivation {
pname = "highlighting-kate";
version = "0.6";
+ revision = "1";
sha256 = "16334fbiyq6017zbgc59qc00h0bk24xh4dcrbqx63dvf72ac37dk";
+ editedCabalFile = "7466b389fd27b0520d371b2b225cb6024e9b7dd371cffa78169c219ab449558b";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -64671,19 +64992,21 @@ self: {
, either, exceptions, http-client, http-client-tls, http-types, jwt
, lens, mtl, network-uri, postgresql-simple, resource-pool, safe
, stm, text, time, transformers, unordered-containers, utf8-string
- , wai, wai-lens, webcrank-wai, wreq
+ , wai, wai-lens, webcrank, webcrank-wai, wreq
}:
mkDerivation {
pname = "hipbot";
- version = "0.3.0.2";
- sha256 = "04czq0ix78amd217cf5yj8yvkr4hpsaa38rdmjish40b63crnba3";
+ version = "0.5";
+ revision = "1";
+ sha256 = "0acy9bp2dwszd01l514nx2crdxgb356k18pm9ravddljxr24n1hs";
+ editedCabalFile = "6ac1673be45c18dc010eeeef508a021ec9fef4e0a4e05864733f91aec8508ab8";
buildDepends = [
aeson base bifunctors blaze-builder bytestring either exceptions
http-client http-client-tls http-types jwt lens mtl network-uri
postgresql-simple resource-pool safe stm text time transformers
- unordered-containers utf8-string wai wai-lens webcrank-wai wreq
+ unordered-containers utf8-string wai wai-lens webcrank webcrank-wai
+ wreq
];
- jailbreak = true;
homepage = "https://github.com/purefn/hipbot";
description = "A library for building HipChat Bots";
license = stdenv.lib.licenses.bsd3;
@@ -65411,8 +65734,8 @@ self: {
({ mkDerivation, base, hspec, sass }:
mkDerivation {
pname = "hlibsass";
- version = "0.1.2.0";
- sha256 = "18hby3vjnzfis2ixbkkrk1zwky4rymx5ai00wza9yx4ijnxrzc3z";
+ version = "0.1.3.0";
+ sha256 = "10mrvpiwmcaijckrcg45zw2zb17fgx43rm4qfi32glvgkakd2zqf";
buildDepends = [ base ];
testDepends = [ base hspec ];
extraLibraries = [ sass ];
@@ -65620,8 +65943,8 @@ self: {
({ mkDerivation, base, binary, gsl, hmatrix, storable-complex }:
mkDerivation {
pname = "hmatrix-gsl-stats";
- version = "0.3.0.2";
- sha256 = "1n0p7pg9rsdckcysczg7l8rqfm3xw1rc2jzp0khb1i33nhbr7bzn";
+ version = "0.3.0.3";
+ sha256 = "0zrh3knwqkaqlgajza22jfg3xhsxhiaf8qmiwnd9qjbasnm5a1lp";
buildDepends = [ base binary hmatrix storable-complex ];
pkgconfigDepends = [ gsl ];
homepage = "http://code.haskell.org/hmatrix-gsl-stats";
@@ -65776,6 +66099,7 @@ self: {
homepage = "http://rd.slavepianos.org/t/hmeap";
description = "Haskell Meapsoft Parser";
license = "GPL";
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"hmeap-utils" = callPackage
@@ -66368,6 +66692,28 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "homplexity" = callPackage
+ ({ mkDerivation, base, containers, cpphs, deepseq, directory
+ , filepath, happy, haskell-src-exts, hflags, template-haskell
+ , uniplate
+ }:
+ mkDerivation {
+ pname = "homplexity";
+ version = "0.4.3.0";
+ sha256 = "0xw3fkbzb3jqi5sr28a69ga632c30g4xwykgd0cq8imrz70jlvam";
+ isLibrary = false;
+ isExecutable = true;
+ buildDepends = [
+ base containers cpphs deepseq directory filepath haskell-src-exts
+ hflags template-haskell uniplate
+ ];
+ testDepends = [ base haskell-src-exts uniplate ];
+ buildTools = [ happy ];
+ homepage = "https://github.com/mgajda/homplexity";
+ description = "Haskell code quality tool";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"honi" = callPackage
({ mkDerivation, base, bytestring, freenect, hspec, HUnit, OpenNI2
, text
@@ -67027,6 +67373,7 @@ self: {
homepage = "https://github.com/yihuang/hosts-server";
description = "An dns server which is extremely easy to config";
license = stdenv.lib.licenses.gpl3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"hothasktags" = callPackage
@@ -67177,8 +67524,8 @@ self: {
}:
mkDerivation {
pname = "hpack";
- version = "0.2.0";
- sha256 = "1a1kjawmf61znikdg9kw34rqhlqhijb00b1dk1w9s8nx52rcrlaa";
+ version = "0.3.1";
+ sha256 = "178pdk9rhqiyzjpdvkfvjs4gfc27k1limi7qpnpqyxzlcrcsplvb";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -67446,8 +67793,8 @@ self: {
}:
mkDerivation {
pname = "hpqtypes";
- version = "1.4.1";
- sha256 = "00ira3zsw9m5vm6pqdgf4v276b7y0crqiwlw3nw99f74xj5qds19";
+ version = "1.4.2";
+ sha256 = "0jmc7m47gidmhnf2dz7hqzlypw1l72n948naccab6j58hkn683kk";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -67990,8 +68337,8 @@ self: {
}:
mkDerivation {
pname = "hs-mesos";
- version = "0.20.2.0";
- sha256 = "1vnfmb5mnp3wsbd7s1ls6rz0ywlirykdx7dclkxcc3rh1y0mxp1n";
+ version = "0.20.3.0";
+ sha256 = "1d9mf35i5nwpnr5l5v75rrcwihfkpfy3ji9jwhk9k0g285bfr5dh";
isLibrary = true;
isExecutable = true;
buildDepends = [ base bytestring lens managed template-haskell ];
@@ -68054,9 +68401,10 @@ self: {
mkDerivation {
pname = "hs-pkg-config";
version = "0.2.1.0";
+ revision = "1";
sha256 = "09v2kp643asl3zpv8rbb8a7zv0h3bn5l4gxz44d71kly9qr3jkhh";
+ editedCabalFile = "9337acf593d6f7e1d54f81886cb3736001a127e3b75ba01bd97a99d77565f784";
buildDepends = [ base data-default-class text ];
- jailbreak = true;
homepage = "https://github.com/trskop/hs-pkg-config";
description = "Create pkg-config configuration files";
license = stdenv.lib.licenses.bsd3;
@@ -69436,9 +69784,9 @@ self: {
mkDerivation {
pname = "hslua";
version = "0.4.0";
- revision = "1";
+ revision = "2";
sha256 = "0l50ppvnavs3lc1vmrpxhlb3ffl772n1hk8mdi9w4ml64ninba3p";
- editedCabalFile = "a2019a0881b90b842dfa9c88e452a45bbadb25d9461d0549ab8fd328a82757ee";
+ editedCabalFile = "43f6956aba870857548523718d3d5645e422187964e5158d14a9c17d96671ccb";
buildDepends = [ base bytestring ];
testDepends = [ base bytestring hspec hspec-contrib HUnit text ];
extraLibraries = [ lua ];
@@ -69723,6 +70071,7 @@ self: {
homepage = "http://rd.slavepianos.org/?t=hspear";
description = "Haskell Spear Parser";
license = "GPL";
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"hspec" = callPackage
@@ -70017,18 +70366,17 @@ self: {
}:
mkDerivation {
pname = "hspec-snap";
- version = "0.3.2.9";
- sha256 = "1m324bjln2i6qz7ym26m82s1qiaq0i0sq4yfscc3bh1s6p8r5vva";
+ version = "0.3.3.0";
+ sha256 = "1ch58zz5yhvp4dq91ls05bgraf2p36aixl189zm3ipc9naidjrg4";
buildDepends = [
- base bytestring containers digestive-functors HandsomeSoup hspec
- hspec-core hxt lens mtl snap snap-core text transformers
+ aeson base bytestring containers digestive-functors HandsomeSoup
+ hspec hspec-core hxt lens mtl snap snap-core text transformers
];
testDepends = [
aeson base bytestring containers digestive-functors directory
HandsomeSoup hspec hspec-core hxt lens mtl snap snap-core text
transformers
];
- jailbreak = true;
homepage = "https://github.com/dbp/hspec-snap";
description = "A library for testing with Hspec and the Snap Web Framework";
license = stdenv.lib.licenses.bsd3;
@@ -70102,17 +70450,19 @@ self: {
}) {};
"hspec-wai-json" = callPackage
- ({ mkDerivation, aeson, aeson-qq, base, bytestring, hspec
- , hspec-wai, template-haskell
+ ({ mkDerivation, aeson, aeson-qq, base, bytestring
+ , case-insensitive, hspec, hspec-wai, template-haskell
}:
mkDerivation {
pname = "hspec-wai-json";
- version = "0.6.0";
- sha256 = "0r9p8v3cynyx5gnan86cc0l5hrmnm3mx7w2kkc1npv6zq0cj1bgq";
+ version = "0.6.1";
+ sha256 = "0sbw6iddywxdg4n8npnz6m0lmcf9nrq3ib7kckpx7shpq9khwgih";
buildDepends = [
- aeson aeson-qq base bytestring hspec-wai template-haskell
+ aeson aeson-qq base bytestring case-insensitive hspec-wai
+ template-haskell
];
testDepends = [ base hspec hspec-wai ];
+ homepage = "https://github.com/hspec/hspec-wai#readme";
description = "Testing JSON APIs with hspec-wai";
license = stdenv.lib.licenses.mit;
}) {};
@@ -71160,8 +71510,8 @@ self: {
}:
mkDerivation {
pname = "http-client";
- version = "0.4.11.2";
- sha256 = "074qh0yj3i4q6m88jccp59vpv5prdwglrrcglsr5k89g06hx4xb2";
+ version = "0.4.11.3";
+ sha256 = "04f9xb1hz5i9sm14nlasia86vjwsx0nmjh1kpk21axvvkbgcnrrq";
buildDepends = [
array base base64-bytestring blaze-builder bytestring
case-insensitive containers cookie data-default-class deepseq
@@ -71422,9 +71772,9 @@ self: {
mkDerivation {
pname = "http-encodings";
version = "0.9.3";
- revision = "1";
+ revision = "2";
sha256 = "0b29zqa2ybja73jip83qn1xhiinn1k64b6dmc39ccp48ip1xdnvn";
- editedCabalFile = "b9e6dd65c8dd4119887c084f1bd14570ab0540e723afb845212f041e871210d7";
+ editedCabalFile = "0370852e7250c2c2bb1575155286442cbfcdd03a7e494dcaa73305d4e84a6c76";
buildDepends = [
base bytestring HTTP iconv mime mtl parsec text utf8-string zlib
];
@@ -71640,8 +71990,8 @@ self: {
}:
mkDerivation {
pname = "http-streams";
- version = "0.8.3.1";
- sha256 = "13fdwyq50d5gipvdxmi125bn7aqhc3zqbi8jikir3l8bigfby5w0";
+ version = "0.8.3.3";
+ sha256 = "0cp2jdalg0vzikl6v4yhyflllv7yqskph5gp5ahirawhcj9rfi9z";
buildDepends = [
aeson attoparsec base base64-bytestring blaze-builder bytestring
case-insensitive directory HsOpenSSL http-common io-streams mtl
@@ -72682,8 +73032,8 @@ self: {
}:
mkDerivation {
pname = "hyakko";
- version = "0.6.6";
- sha256 = "1y0b5rxgiaygy0y42s2rnnw87br4d73nbjii9gpbf80rlvhdjagw";
+ version = "0.6.7";
+ sha256 = "1k81whay05mp9jb39gmb64l2xqxa90yrb7svbphj1cnsz0b76qwk";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -73103,6 +73453,7 @@ self: {
testDepends = [
base containers directory doctest filepath unordered-containers
];
+ jailbreak = true;
homepage = "http://github.com/ekmett/hyphenation";
description = "Configurable Knuth-Liang hyphenation";
license = stdenv.lib.licenses.bsd3;
@@ -73329,7 +73680,9 @@ self: {
mkDerivation {
pname = "ide-backend-common";
version = "0.9.1.2";
+ revision = "1";
sha256 = "1cj594vq0x87h9mvwsj9mplacrdn999bbsknjwdpvrpsbadlx5q7";
+ editedCabalFile = "cdbec9d6422b6888b23622286333a5119e9913f82e49f85676bb56d6ca850b38";
buildDepends = [
aeson async attoparsec base binary bytestring bytestring-trie
containers crypto-api data-accessor directory filepath fingertree
@@ -73615,24 +73968,22 @@ self: {
}) {};
"ig" = callPackage
- ({ mkDerivation, aeson, attoparsec, base, base16-bytestring
- , bytestring, conduit, conduit-extra, crypto-api, cryptohash
+ ({ mkDerivation, aeson, base, base16-bytestring, bytestring
+ , conduit, conduit-extra, crypto-api, cryptohash
, cryptohash-cryptoapi, data-default, http-conduit, http-types
, lifted-base, monad-control, resourcet, text, time, transformers
, transformers-base, unordered-containers
}:
mkDerivation {
pname = "ig";
- version = "0.2.1";
- sha256 = "0kl44fv3djcrr87gqpcdbsvqiliwxz2iw5fd07h8xrvmls3b1lgj";
+ version = "0.2.2";
+ sha256 = "0qg9786sih7bcmdvmih5qg8p0j8r7vh78cp5yaw2f9rldica9a4k";
buildDepends = [
- aeson attoparsec base base16-bytestring bytestring conduit
- conduit-extra crypto-api cryptohash cryptohash-cryptoapi
- data-default http-conduit http-types lifted-base monad-control
- resourcet text time transformers transformers-base
- unordered-containers
+ aeson base base16-bytestring bytestring conduit conduit-extra
+ crypto-api cryptohash cryptohash-cryptoapi data-default
+ http-conduit http-types lifted-base monad-control resourcet text
+ time transformers transformers-base unordered-containers
];
- jailbreak = true;
homepage = "https://github.com/prowdsponsor/ig";
description = "Bindings to Instagram's API";
license = stdenv.lib.licenses.bsd3;
@@ -74420,12 +74771,9 @@ self: {
({ mkDerivation, base }:
mkDerivation {
pname = "index-core";
- version = "1.0.1";
- revision = "1";
- sha256 = "01d7025js5a3373a8ixl3clvmd0blpkly6js3ggnp26p4h5ilhv4";
- editedCabalFile = "dbc4c7390f6664ca0ad083bb005897e6f3ca5dca5e95709621c131d7a1a0f09f";
+ version = "1.0.2";
+ sha256 = "0sj69r9mavw1s17lhh7af9n5vrb60gk5lm6v593sp0rs77canldw";
buildDepends = [ base ];
- jailbreak = true;
description = "Indexed Types";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -74627,8 +74975,8 @@ self: {
}:
mkDerivation {
pname = "influxdb";
- version = "0.9.1.2";
- sha256 = "1nn1vflzb4c8xvvnnxl3ph947nxy5ibyh8bzrp2ddwjb62xm2l00";
+ version = "0.9.1.3";
+ sha256 = "0v092i592j5n31fl0vc5750pqjbgaj10n3dm314bkll6ld0gdbwx";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -74640,7 +74988,6 @@ self: {
base http-client HUnit mtl tasty tasty-hunit tasty-quickcheck
tasty-th text vector
];
- jailbreak = true;
homepage = "https://github.com/maoe/influxdb-haskell";
description = "Haskell client library for InfluxDB";
license = stdenv.lib.licenses.bsd3;
@@ -74720,8 +75067,8 @@ self: {
}:
mkDerivation {
pname = "inline-c";
- version = "0.5.3.1";
- sha256 = "1n4w1lr3jwx4dwcks0c7rc79hdf4jwsgl3famivrdls01fqv9dhi";
+ version = "0.5.3.2";
+ sha256 = "0sihzjscdrk02z2d22j0fcqgk05nhpg16zy2cdkxjj4cp09nbaac";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -74750,6 +75097,20 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "inline-c-win32" = callPackage
+ ({ mkDerivation, base, containers, inline-c, template-haskell
+ , Win32
+ }:
+ mkDerivation {
+ pname = "inline-c-win32";
+ version = "0.1";
+ sha256 = "14255dn7smmm1rpnjifn7gn2amcncnf3j45ah22bblyb4h27iikm";
+ buildDepends = [ base containers inline-c template-haskell Win32 ];
+ homepage = "https://github.com/anton-dessiatov/inline-c-win32";
+ description = "Win32 API Context for the inline-c library";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"inquire" = callPackage
({ mkDerivation, aether, base, text }:
mkDerivation {
@@ -75133,8 +75494,8 @@ self: {
}:
mkDerivation {
pname = "intricacy";
- version = "0.4.1";
- sha256 = "1gv2kgm3r5b4nh8d58nwrilyzxr7l4awn1qlwl7wnkfi99h5nlz8";
+ version = "0.4.3";
+ sha256 = "07ha7vl8qzvfyk776f0pr6wb9fjcwmmqplp91bfpmzslifw2k01r";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -75167,12 +75528,13 @@ self: {
}) {};
"invariant" = callPackage
- ({ mkDerivation, base, contravariant }:
+ ({ mkDerivation, base, contravariant, hspec, QuickCheck }:
mkDerivation {
pname = "invariant";
- version = "0.1.1";
- sha256 = "077jhn2fspnjkr8p3sh6draidqpk6wpism73rz8172acd4jjg4fz";
+ version = "0.1.2";
+ sha256 = "02p114wnpxbqxik4sz87bd9rcqfs9klgsxi9pc4v1qwyb64mb92b";
buildDepends = [ base contravariant ];
+ testDepends = [ base hspec QuickCheck ];
description = "Haskell 98 invariant functors";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -75292,8 +75654,8 @@ self: {
}:
mkDerivation {
pname = "io-streams";
- version = "1.3.0.0";
- sha256 = "029qp0jfap6jczxdi2my1g4vcp8pr4zkxp64xfl7cyiigbapkimw";
+ version = "1.3.1.0";
+ sha256 = "1fic83lgvyji75gyx8c9ik9lj6jf65wbqmzp30siqmkhdp9y1rxf";
buildDepends = [
attoparsec base bytestring bytestring-builder network primitive
process text time transformers vector zlib-bindings
@@ -75378,6 +75740,23 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "ip-quoter" = callPackage
+ ({ mkDerivation, base, network, split, tasty, tasty-hunit
+ , template-haskell
+ }:
+ mkDerivation {
+ pname = "ip-quoter";
+ version = "1.0.0.0";
+ revision = "1";
+ sha256 = "1idi03f6l9nwnsfp2mvkxz4sgwqlpa8ag3h5drb3i4hwgx0mkhfg";
+ editedCabalFile = "5cd6b449c4acd24b27d27a839acdab85f65b5556dd7bc8be115b7e2f6dc5df11";
+ buildDepends = [ base network split template-haskell ];
+ testDepends = [ base network tasty tasty-hunit ];
+ homepage = "https://github.com/shlevy/ip-quoter";
+ description = "Quasiquoter for IP addresses";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"ip6addr" = callPackage
({ mkDerivation, base, cmdargs, IPv6Addr, text }:
mkDerivation {
@@ -75682,18 +76061,16 @@ self: {
"ircbot" = callPackage
({ mkDerivation, base, bytestring, containers, directory, filepath
- , irc, mtl, network, old-locale, parsec, random, SafeSemaphore, stm
- , time, unix
+ , irc, mtl, network, parsec, random, SafeSemaphore, stm, time, unix
}:
mkDerivation {
pname = "ircbot";
- version = "0.6.2";
- sha256 = "0jl6sgm7bk4yi1l4s6j3yir3rpbxx8r4ri267xcw77b2vzbxq7l0";
+ version = "0.6.4";
+ sha256 = "024wmkp08rni9frflpjl0p30ql6k1kj956j5dysz40xygajk8fmd";
buildDepends = [
base bytestring containers directory filepath irc mtl network
- old-locale parsec random SafeSemaphore stm time unix
+ parsec random SafeSemaphore stm time unix
];
- jailbreak = true;
homepage = "http://hub.darcs.net/stepcut/ircbot";
description = "A library for writing irc bots";
license = stdenv.lib.licenses.bsd3;
@@ -76696,19 +77073,19 @@ self: {
({ mkDerivation, arrows, base, bytestring, cmdargs
, data-default-class, data-default-instances-base, Diff, directory
, filepath, HTTP, http-encodings, hxt, hxt-tagsoup
- , language-ecmascript, network, random, tasty, tasty-golden
- , transformers
+ , language-ecmascript, network, network-uri, random, tasty
+ , tasty-golden, transformers
}:
mkDerivation {
pname = "jespresso";
- version = "1.0.1";
- sha256 = "0rl4k1vn5q23rjylpyya6dmp6pwdbdvrlxgkczxwy84j9xm665zg";
+ version = "1.0.1.1";
+ sha256 = "0lxkn0zd4y7b36y42hxpfan5jcy910ksl044yvmrk634p7s3996h";
isLibrary = true;
isExecutable = true;
buildDepends = [
arrows base bytestring cmdargs data-default-class
data-default-instances-base HTTP http-encodings hxt hxt-tagsoup
- language-ecmascript network random
+ language-ecmascript network network-uri random
];
testDepends = [
arrows base Diff directory filepath hxt tasty tasty-golden
@@ -77389,6 +77766,25 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "json-togo" = callPackage
+ ({ mkDerivation, aeson, attoparsec, attoparsec-trans, base
+ , bytestring, scientific, text, transformers, unordered-containers
+ , vector
+ }:
+ mkDerivation {
+ pname = "json-togo";
+ version = "0.1.0.1";
+ sha256 = "05g8k8qsxjwqrdwqf24g90hx5jlrwjpa4vsjf0ddrw0whnva3gbz";
+ buildDepends = [
+ aeson attoparsec attoparsec-trans base bytestring scientific text
+ transformers unordered-containers vector
+ ];
+ jailbreak = true;
+ homepage = "https://github.com/srijs/haskell-json-togo";
+ description = "Effectful parsing of JSON documents";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"json-tools" = callPackage
({ mkDerivation, aeson, attoparsec, base, bytestring, containers
, process, tar, text, unordered-containers, vector
@@ -77955,6 +78351,242 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "keera-callbacks" = callPackage
+ ({ mkDerivation, base, mtl }:
+ mkDerivation {
+ pname = "keera-callbacks";
+ version = "0.1";
+ sha256 = "1xgxg30za69nfk8y83bmskjq2w3r3afg4gc507wkn91xdah93niq";
+ buildDepends = [ base mtl ];
+ description = "Mutable memory locations with callbacks";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-i18n" = callPackage
+ ({ mkDerivation, base, directory, filepath, glib, hgettext
+ , MissingK, setlocale, utf8-string
+ }:
+ mkDerivation {
+ pname = "keera-hails-i18n";
+ version = "0.0.3.3";
+ sha256 = "0aih2mxgyfnrfnvqqsdv5g7r4jgjg5cfqykgalcsb9wqv0gq6d4i";
+ buildDepends = [
+ base directory filepath glib hgettext MissingK setlocale
+ utf8-string
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Rapid Gtk Application Development - I18N";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-mvc-controller" = callPackage
+ ({ mkDerivation, base }:
+ mkDerivation {
+ pname = "keera-hails-mvc-controller";
+ version = "0.0.3.3";
+ sha256 = "00qr5czm0hq3jxwp42fc50v6r458rm9qq9fpri4rhnc41il79nzb";
+ buildDepends = [ base ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Gtk rails - Gtk-based controller for MVC applications";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-mvc-environment-gtk" = callPackage
+ ({ mkDerivation, base, keera-hails-mvc-model-protectedmodel
+ , keera-hails-mvc-view, keera-hails-mvc-view-gtk
+ }:
+ mkDerivation {
+ pname = "keera-hails-mvc-environment-gtk";
+ version = "0.0.3.3";
+ sha256 = "0bk3191x8bsvmmnqyf7jzmrlg71q26z2kn4xfahdnpgxw3qskwmr";
+ buildDepends = [
+ base keera-hails-mvc-model-protectedmodel keera-hails-mvc-view
+ keera-hails-mvc-view-gtk
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Gtk rails - Gtk-based global environment for MVC applications";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-mvc-model-lightmodel" = callPackage
+ ({ mkDerivation, base, containers, keera-hails-reactivevalues
+ , MissingK, stm, template-haskell
+ }:
+ mkDerivation {
+ pname = "keera-hails-mvc-model-lightmodel";
+ version = "0.0.3.4";
+ sha256 = "085qppi68qf8jbkp674ldikhr5z4nrffzqa9kgdm1dngrgsib190";
+ buildDepends = [
+ base containers keera-hails-reactivevalues MissingK stm
+ template-haskell
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Rapid Gtk Application Development - Reactive Protected Light Models";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
+ "keera-hails-mvc-model-protectedmodel" = callPackage
+ ({ mkDerivation, base, containers, keera-hails-reactivevalues
+ , MissingK, stm, template-haskell
+ }:
+ mkDerivation {
+ pname = "keera-hails-mvc-model-protectedmodel";
+ version = "0.0.3.5";
+ sha256 = "14jm1116j3plzglxygjdymfy8z3p5k8zinnh8wazkxgc5y9kkcsx";
+ buildDepends = [
+ base containers keera-hails-reactivevalues MissingK stm
+ template-haskell
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Rapid Gtk Application Development - Protected Reactive Models";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-mvc-solutions-config" = callPackage
+ ({ mkDerivation, base, directory, filepath, MissingK }:
+ mkDerivation {
+ pname = "keera-hails-mvc-solutions-config";
+ version = "0.0.3.3";
+ sha256 = "16c6nh5fqw2r42nxs3x27rqbpscypjzgqnprl99241giwcvy98x1";
+ buildDepends = [ base directory filepath MissingK ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Gtk rails - Easy handling of configuration files";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-mvc-solutions-gtk" = callPackage
+ ({ mkDerivation, base, gtk, hslogger, HTTP
+ , keera-hails-mvc-environment-gtk
+ , keera-hails-mvc-model-protectedmodel, keera-hails-mvc-view
+ , keera-hails-mvc-view-gtk, keera-hails-reactivevalues, MissingK
+ , mtl, network, network-uri, template-haskell
+ }:
+ mkDerivation {
+ pname = "keera-hails-mvc-solutions-gtk";
+ version = "0.0.3.3";
+ sha256 = "1j0821aysvzpa8qnnz9066gwxk1bwn0sykihb5p5br62n7xzhgkf";
+ buildDepends = [
+ base gtk hslogger HTTP keera-hails-mvc-environment-gtk
+ keera-hails-mvc-model-protectedmodel keera-hails-mvc-view
+ keera-hails-mvc-view-gtk keera-hails-reactivevalues MissingK mtl
+ network network-uri template-haskell
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Gtk rails - Common solutions to recurrent problems in Gtk applications";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-mvc-view" = callPackage
+ ({ mkDerivation, base }:
+ mkDerivation {
+ pname = "keera-hails-mvc-view";
+ version = "0.0.3.3";
+ sha256 = "0jkwbpw23ba5z83nfk51hp8wsfkrbbiwr0f6bvx39wzz1v81n58p";
+ buildDepends = [ base ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Gtk rails - Generic View for MVC applications";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-mvc-view-gtk" = callPackage
+ ({ mkDerivation, base, gtk, gtk-helpers, keera-hails-mvc-view }:
+ mkDerivation {
+ pname = "keera-hails-mvc-view-gtk";
+ version = "0.0.3.3";
+ sha256 = "1yz4drm0r1831acg9y8glg7hgiqwgc5nqkz4hfgqgfngqs94jx4z";
+ buildDepends = [ base gtk gtk-helpers keera-hails-mvc-view ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Gtk rails - Gtk-based View for MVC applications";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-reactive-fs" = callPackage
+ ({ mkDerivation, base, directory, fsnotify
+ , keera-hails-reactivevalues, system-filepath
+ }:
+ mkDerivation {
+ pname = "keera-hails-reactive-fs";
+ version = "0.0.3.4";
+ sha256 = "1yinlhp08xxdlbnm90gnwbr1h9sp8r741ihd8kihy1yfqzkp85cy";
+ buildDepends = [
+ base directory fsnotify keera-hails-reactivevalues system-filepath
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Rails - Files as Reactive Values";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-reactive-gtk" = callPackage
+ ({ mkDerivation, base, gtk, gtk-helpers, keera-hails-reactivevalues
+ , mtl, transformers
+ }:
+ mkDerivation {
+ pname = "keera-hails-reactive-gtk";
+ version = "0.0.3.5";
+ sha256 = "01hvakmxjm9vpfwp4s7c1s3jqiy21yqb9rgjs2drf2kb66ndvsq9";
+ buildDepends = [
+ base gtk gtk-helpers keera-hails-reactivevalues mtl transformers
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Gtk rails - Reactive Fields for Gtk widgets";
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
+ "keera-hails-reactive-network" = callPackage
+ ({ mkDerivation, base, keera-hails-reactivevalues, network }:
+ mkDerivation {
+ pname = "keera-hails-reactive-network";
+ version = "0.0.3.3";
+ sha256 = "1379djvy5nn6k67ds7mk9jjh03zd6sj0v8sf5agmk3pf5cyp0xa3";
+ buildDepends = [ base keera-hails-reactivevalues network ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Rails - Sockets as Reactive Values";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-reactive-polling" = callPackage
+ ({ mkDerivation, base, keera-callbacks, keera-hails-reactivevalues
+ }:
+ mkDerivation {
+ pname = "keera-hails-reactive-polling";
+ version = "0.0.3.3";
+ sha256 = "1khkbhj94y6y5s2d56h718c8kh3y698wdryi2369mrw755dy6qh8";
+ buildDepends = [ base keera-callbacks keera-hails-reactivevalues ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Rails - Polling based Readable RVs";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-reactive-wx" = callPackage
+ ({ mkDerivation, base, keera-hails-reactivevalues, wx, wxcore }:
+ mkDerivation {
+ pname = "keera-hails-reactive-wx";
+ version = "0.0.3.3";
+ sha256 = "02ikqqfgwr3nrr18qdd1jshqm0dlnwbybqpzpj2ba7zbwpabd5bw";
+ buildDepends = [ base keera-hails-reactivevalues wx wxcore ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Rails - Reactive Fields for WX widgets";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "keera-hails-reactive-yampa" = callPackage
+ ({ mkDerivation, base, keera-callbacks, keera-hails-reactivevalues
+ , time, Yampa
+ }:
+ mkDerivation {
+ pname = "keera-hails-reactive-yampa";
+ version = "0.0.3.3";
+ sha256 = "1n1xyr9pc1sw9gypwhh1rfdjshg7x1kvwr6v3hp0837zvdcz8gw1";
+ buildDepends = [
+ base keera-callbacks keera-hails-reactivevalues time Yampa
+ ];
+ homepage = "http://www.keera.es/blog/community/";
+ description = "Haskell on Rails - FRP Yampa Signal Functions as RVs";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"keera-hails-reactivevalues" = callPackage
({ mkDerivation, base, contravariant }:
mkDerivation {
@@ -79422,8 +80054,8 @@ self: {
}:
mkDerivation {
pname = "language-c-quote";
- version = "0.10.2.1";
- sha256 = "0klr7b4sdi8bsln9hw3xa56d3s1h869zkyqnm97fiyvzar91g532";
+ version = "0.10.2.2";
+ sha256 = "0y65mlx4zx1n7n6y3gjvzqzr2k8bxbbjn4wsjr8mzpib0gqfqpss";
buildDepends = [
array base bytestring containers exception-mtl
exception-transformers filepath haskell-src-meta mainland-pretty
@@ -79921,8 +80553,8 @@ self: {
({ mkDerivation, base, mtl, parsers, text, trifecta }:
mkDerivation {
pname = "language-thrift";
- version = "0.1.0.1";
- sha256 = "11z8lkny9bhbbgchpy3jz1nn867ygqi4rq5vffxqpbj6qq2a8bxk";
+ version = "0.2.0.0";
+ sha256 = "01wvpm4aa222ic8z6wg0wdjyfnkd8gh2kqsda7qfckcyxs9679qw";
buildDepends = [ base mtl parsers text trifecta ];
homepage = "https://github.com/abhinav/language-thrift";
description = "Parser for the Thrift IDL format";
@@ -80445,8 +81077,8 @@ self: {
}:
mkDerivation {
pname = "leksah";
- version = "0.15.0.1";
- sha256 = "169vrqdxcx8xkilrw3dh5zmdsb876fny4n0k5gzvi8fian0dl8nh";
+ version = "0.15.0.3";
+ sha256 = "11b4kp1bbw35gsrdcr5kjyjrfiqrqfy645nbpngjz7rzivjl6n4s";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -80480,8 +81112,8 @@ self: {
}:
mkDerivation {
pname = "leksah-server";
- version = "0.15.0.1";
- sha256 = "04sxfzl8p9fk8qkzmwnm7fkg5sgrzjx0992kivgbrnyx7wh06xsp";
+ version = "0.15.0.2";
+ sha256 = "090nz2kvsf83jdp2lhng5x87a96xzxknsr4vx2jc2r2vs60841lx";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -80660,16 +81292,33 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "lens-regex" = callPackage
+ ({ mkDerivation, array, base, directory, doctest, filepath, lens
+ , regex-base, regex-posix, template-haskell
+ }:
+ mkDerivation {
+ pname = "lens-regex";
+ version = "0.1.0";
+ sha256 = "0hjizjmvdngxn63gs7x87qidh71aqhvyigrnqlbfjqan76pb6m29";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [ array base lens regex-base template-haskell ];
+ testDepends = [ base directory doctest filepath regex-posix ];
+ homepage = "https://github.com/himura/lens-regex";
+ description = "Lens powered regular expression";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"lens-simple" = callPackage
({ mkDerivation, base, lens-family, lens-family-core
- , lens-family-th
+ , lens-family-th, transformers
}:
mkDerivation {
pname = "lens-simple";
- version = "0.1.0.2";
- sha256 = "1gsfij0n70wwvcrgr0lq98kwswghv16y1d0gxnyrfgxkpar47fhf";
+ version = "0.1.0.5";
+ sha256 = "1hn2g9xswfn94m5hxi39jpmdaxm51l231cvqn2a62pr8j6b34839";
buildDepends = [
- base lens-family lens-family-core lens-family-th
+ base lens-family lens-family-core lens-family-th transformers
];
homepage = "https://github.com/michaelt/lens-simple";
description = "simplified import of elementary lens-family combinators";
@@ -80738,6 +81387,30 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "lentil" = callPackage
+ ({ mkDerivation, ansi-wl-pprint, base, csv, directory, filemanip
+ , filepath, hspec, natural-sort, optparse-applicative, parsec
+ , regex-tdfa
+ }:
+ mkDerivation {
+ pname = "lentil";
+ version = "0.1.1.2";
+ sha256 = "06k0vvxp8vd43bbslm78lmmmc89q3b9ghwfj0chvaw32m0hd8l0z";
+ isLibrary = false;
+ isExecutable = true;
+ buildDepends = [
+ ansi-wl-pprint base csv directory filemanip filepath natural-sort
+ optparse-applicative parsec regex-tdfa
+ ];
+ testDepends = [
+ ansi-wl-pprint base csv directory filemanip filepath hspec
+ natural-sort optparse-applicative parsec regex-tdfa
+ ];
+ homepage = "http://www.ariis.it/static/articles/lentil/page.html";
+ description = "frugal issue tracker";
+ license = stdenv.lib.licenses.gpl3;
+ }) {};
+
"level-monad" = callPackage
({ mkDerivation, base, fmlist }:
mkDerivation {
@@ -81791,6 +82464,18 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "lindenmayer" = callPackage
+ ({ mkDerivation, base }:
+ mkDerivation {
+ pname = "lindenmayer";
+ version = "0.1.0.1";
+ sha256 = "07gz4lbvyzahffcp6f1f87zl20kf834iswh671vb8vxffigrz5y1";
+ buildDepends = [ base ];
+ homepage = "https://github.com/reinh/hs-lindenmayer";
+ description = "L-systems in Haskell";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"line-break" = callPackage
({ mkDerivation, base }:
mkDerivation {
@@ -81829,7 +82514,9 @@ self: {
mkDerivation {
pname = "linear";
version = "1.18.1.1";
+ revision = "2";
sha256 = "1qgpv6c3q4ljqc3223iyj49piqs9xx58zmnpvg76wkaygsnnzq9p";
+ editedCabalFile = "8c57bd840e0c9ab84b032d65a2a48ed6d20da4fb780f0d89d8c53adccc632ba4";
buildDepends = [
adjunctions base binary bytes cereal containers deepseq
distributive ghc-prim hashable lens reflection semigroupoids
@@ -81840,6 +82527,7 @@ self: {
base binary bytestring directory doctest filepath HUnit lens
simple-reflect test-framework test-framework-hunit
];
+ jailbreak = true;
homepage = "http://github.com/ekmett/linear/";
description = "Linear Algebra";
license = stdenv.lib.licenses.bsd3;
@@ -81877,6 +82565,18 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "linear-grammar" = callPackage
+ ({ mkDerivation, base, containers, hspec, QuickCheck }:
+ mkDerivation {
+ pname = "linear-grammar";
+ version = "0.0.2.1";
+ sha256 = "00vfhcqhg6azb1ay12n248l0bjg5g0c5y5ybz5rqf2jdlab7fg97";
+ buildDepends = [ base containers QuickCheck ];
+ testDepends = [ base containers hspec QuickCheck ];
+ description = "A simple grammar for building linear equations and inclusive inequalities";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"linear-maps" = callPackage
({ mkDerivation, base, containers, HUnit }:
mkDerivation {
@@ -83132,6 +83832,7 @@ self: {
homepage = "http://www.comp.leeds.ac.uk/sc06r2s/Projects/HaskellLocalSearch";
description = "Generalised local search within Haskell, for applications in combinatorial optimisation";
license = "GPL";
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"locators" = callPackage
@@ -83184,8 +83885,8 @@ self: {
}:
mkDerivation {
pname = "lock-file";
- version = "0.5.0.1";
- sha256 = "0x1pis244pg5k91y3p40m2pc483vx49gcdqa95f7q0gjsnvb9yi9";
+ version = "0.5.0.2";
+ sha256 = "1l4slkykw59p20kw9iqaa4pjczqx701a9z14nvbzwrmgs2acnki7";
buildDepends = [
base data-default-class directory exceptions tagged-exception-core
transformers
@@ -83195,7 +83896,6 @@ self: {
tagged-exception-core test-framework test-framework-hunit
test-framework-quickcheck2 transformers
];
- jailbreak = true;
homepage = "https://github.com/trskop/lock-file";
description = "Provide exclusive access to a resource using lock file";
license = stdenv.lib.licenses.bsd3;
@@ -83230,8 +83930,8 @@ self: {
}:
mkDerivation {
pname = "log";
- version = "0.2.0";
- sha256 = "1mm41m8vg7n6hnnrg47qy2pbhsxgykclz3wypjsf1zj5wbqdd2w0";
+ version = "0.2.1";
+ sha256 = "0jply63w04pnkfv3s8lpnwvjf43sfhf3mk72p3wva4p28c6mql31";
buildDepends = [
aeson aeson-pretty base bytestring deepseq exceptions hpqtypes
monad-control monad-time mtl old-locale split stm text time
@@ -84262,9 +84962,12 @@ self: {
mkDerivation {
pname = "machinecell";
version = "1.3.1";
+ revision = "1";
sha256 = "1v4rrjszh6sm2x1nwq33f4xwa41bnls0awhy9qfkap62bpad8fxg";
+ editedCabalFile = "5a7ee43c327694ac753228da8f16d681a60d23b4926132726e2a093ecacb4725";
buildDepends = [ arrows base free mtl profunctors semigroups ];
testDepends = [ base hspec mtl profunctors QuickCheck ];
+ jailbreak = true;
homepage = "http://github.com/as-capabl/machinecell";
description = "Arrow based stream transducers";
license = stdenv.lib.licenses.bsd3;
@@ -84287,6 +84990,7 @@ self: {
transformers void
];
testDepends = [ base directory doctest filepath ];
+ jailbreak = true;
homepage = "http://github.com/ekmett/machines/";
description = "Networked stream transducers";
license = stdenv.lib.licenses.bsd3;
@@ -86185,8 +86889,8 @@ self: {
}:
mkDerivation {
pname = "memory";
- version = "0.6";
- sha256 = "18r0rnh2x5sazn2i23v222vxrgsgyyzbfvasg21r2kh42i0vh2bw";
+ version = "0.7";
+ sha256 = "1yj1v4xr3y3inrn1rzlh1lfmgxi8p15k4qm48bac76qg3a2wh8z1";
buildDepends = [ base bytestring deepseq ghc-prim ];
testDepends = [ base tasty tasty-hunit tasty-quickcheck ];
homepage = "https://github.com/vincenthz/hs-memory";
@@ -86392,8 +87096,8 @@ self: {
}:
mkDerivation {
pname = "metrics";
- version = "0.3.0.0";
- sha256 = "1g1nxb7q834nslrmgmqarbbq3ah60k2fqj71k55z9dj4waqgx2sg";
+ version = "0.3.0.1";
+ sha256 = "1mj4x5pq9mch71vk5cqi2wjaqjhgsllvjbsz7yyv6sg4cps63d8l";
buildDepends = [
ansi-terminal base bytestring containers lens mtl mwc-random
primitive text time unix unordered-containers vector
@@ -86562,6 +87266,34 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "mida" = callPackage
+ ({ mkDerivation, base, containers, directory, filepath, haskeline
+ , HCodecs, mersenne-random-pure64, mtl, optparse-applicative
+ , parsec, process, QuickCheck, test-framework
+ , test-framework-quickcheck2, text, text-format, transformers
+ }:
+ mkDerivation {
+ pname = "mida";
+ version = "0.4.3";
+ sha256 = "0x71qih8r48kp2anvdnwfkja3sz8iigzprsqkaqi259mn58qd9ch";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [
+ base containers directory filepath haskeline HCodecs
+ mersenne-random-pure64 mtl optparse-applicative parsec process text
+ text-format transformers
+ ];
+ testDepends = [
+ base containers HCodecs mersenne-random-pure64 mtl parsec
+ QuickCheck test-framework test-framework-quickcheck2 text
+ transformers
+ ];
+ homepage = "https://github.com/mrkkrp/mida";
+ description = "Language for algorithmic generation of MIDI files";
+ license = stdenv.lib.licenses.gpl3;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"midi" = callPackage
({ mkDerivation, base, binary, bytestring, event-list
, explicit-exception, monoid-transformer, non-negative, QuickCheck
@@ -86802,8 +87534,8 @@ self: {
}:
mkDerivation {
pname = "mime-mail";
- version = "0.4.8.2";
- sha256 = "19f2q4x8b19sc7y1yyxvl3fsyggjs07yhf1zjw42a875lp4mnvia";
+ version = "0.4.9";
+ sha256 = "1l638jr7914227mg8854i6xgyhq403kb1zc2py77yb0xifm20534";
buildDepends = [
base base64-bytestring blaze-builder bytestring filepath process
random text
@@ -87330,14 +88062,19 @@ self: {
}) {};
"mockery" = callPackage
- ({ mkDerivation, base, directory, hspec, logging-facade, temporary
+ ({ mkDerivation, base, bytestring, directory, filepath, hspec
+ , logging-facade, temporary
}:
mkDerivation {
pname = "mockery";
- version = "0.2.0";
- sha256 = "18a9zz964crhjb1xdzv38pwg458lxajhvjpqd08klb1w7kh57hlj";
- buildDepends = [ base directory logging-facade temporary ];
- testDepends = [ base directory hspec logging-facade temporary ];
+ version = "0.3.0";
+ sha256 = "1k9ywdamdl1c8nvp4yrjmqpbis1nqj9p9cim5rh72n9w5h3qaa6x";
+ buildDepends = [
+ base bytestring directory filepath logging-facade temporary
+ ];
+ testDepends = [
+ base bytestring directory filepath hspec logging-facade temporary
+ ];
description = "Support functions for automated testing";
license = stdenv.lib.licenses.mit;
}) {};
@@ -87403,6 +88140,7 @@ self: {
sha256 = "005pbkrszgkbm0qx9hzn1f72l9z07qhqypmcw72fi5i5hppr45av";
buildDepends = [ base ];
testDepends = [ base doctest Glob ];
+ jailbreak = true;
homepage = "https://github.com/TikhonJelvis/modular-arithmetic";
description = "A type for integers modulo some constant";
license = stdenv.lib.licenses.bsd3;
@@ -88066,10 +88804,9 @@ self: {
({ mkDerivation, base, mmorph, mtl, transformers }:
mkDerivation {
pname = "monad-resumption";
- version = "0.1.1.4";
- sha256 = "0zrzxkzg6fzxiqr9k4kw6r1ivw22qwz2dhl1nd5xqr7lfsqc00zs";
+ version = "0.1.1.5";
+ sha256 = "08h750qbvzvlw5hyp1d44rkhiqlhgnsfy8sya2ya7p62l80w96sf";
buildDepends = [ base mmorph mtl transformers ];
- jailbreak = true;
homepage = "https://github.com/igraves/resumption_monads";
description = "Resumption and reactive resumption monads for Haskell";
license = stdenv.lib.licenses.bsd3;
@@ -88219,8 +88956,11 @@ self: {
mkDerivation {
pname = "monad-unify";
version = "0.2.2";
+ revision = "1";
sha256 = "1icl4jaa4vc4lb75m6wv4vjvf8b2xx7aziqhsg2pshizdkfxmgwp";
+ editedCabalFile = "7d585b29bfa558cf59d169421d1ec3363b6ef56b88cf6a9a082192d609676ce2";
buildDepends = [ base mtl unordered-containers ];
+ jailbreak = true;
description = "Generic first-order unification";
license = stdenv.lib.licenses.mit;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -88605,10 +89345,8 @@ self: {
}:
mkDerivation {
pname = "mono-traversable";
- version = "0.9.1";
- revision = "1";
- sha256 = "0hzqlldilkkfmrq3pkymwkzpp9dn40v6fa18kahxlf4qiyih0xzc";
- editedCabalFile = "28392123a8b245f7bc2c13bb63f5c3008118ed38e107cf0534be37461fb64daf";
+ version = "0.9.2";
+ sha256 = "1cw8bsf6ayalsx0l0xwb2f2j2rg6zpfsvci174fr4xiyr646mpd6";
buildDepends = [
base bytestring comonad containers dlist dlist-instances hashable
semigroupoids semigroups text transformers unordered-containers
@@ -88676,8 +89414,8 @@ self: {
}:
mkDerivation {
pname = "monoid-subclasses";
- version = "0.4.0.4";
- sha256 = "1wg5yx49gx8j9hxcr3mp3pq40wqpwhh4cccsg7m2fgdnangxd6rh";
+ version = "0.4.1";
+ sha256 = "0wgy0cqi2x12xn1sbxwfbwzj6bii2b6rhf8gi4q2jja5nh04a4vz";
buildDepends = [ base bytestring containers primes text vector ];
testDepends = [
base bytestring containers primes QuickCheck quickcheck-instances
@@ -89477,13 +90215,16 @@ self: {
mkDerivation {
pname = "mueval";
version = "0.9.1.1";
+ revision = "2";
sha256 = "0p9qf8lb3c1y87qpl9b4n6v6bjrb9fw3yfg4p7niqdz31454d2pz";
+ editedCabalFile = "26147e2bbac6b9afea949ab81c6072fc89bbff6b7e6678f3ce57c77d26264832";
isLibrary = true;
isExecutable = true;
buildDepends = [
base Cabal containers directory extensible-exceptions filepath hint
mtl process show simple-reflect unix utf8-string
];
+ jailbreak = true;
homepage = "https://github.com/gwern/mueval";
description = "Safely evaluate pure Haskell expressions";
license = stdenv.lib.licenses.bsd3;
@@ -89716,12 +90457,12 @@ self: {
}) {};
"multiset-comb" = callPackage
- ({ mkDerivation, base }:
+ ({ mkDerivation, base, containers, transformers }:
mkDerivation {
pname = "multiset-comb";
- version = "0.2.3";
- sha256 = "0qkl6csnl1g6wbsyxirdq8hdbbbkp3dfsjix76yx242wdyh1j6pq";
- buildDepends = [ base ];
+ version = "0.2.4";
+ sha256 = "0j7vxm67aws7dzlmdkvx2aja888jp22qdzz8hgmhvbpcr4p7lz99";
+ buildDepends = [ base containers transformers ];
description = "Combinatorial algorithms over multisets";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -89740,16 +90481,17 @@ self: {
}) {};
"multistate" = callPackage
- ({ mkDerivation, base, mtl, transformers }:
+ ({ mkDerivation, base, hspec, mtl, tagged, transformers }:
mkDerivation {
pname = "multistate";
- version = "0.3.0.0";
- sha256 = "1sqaxvvs94max8gw1sz3kkgnp8y9zwrjdclnzv1kkkhciix9a1d1";
+ version = "0.6.0.0";
+ sha256 = "17b54qy4dgacj0lwy61nf3hbppd950xk9c1yphjn6i6jcr8z66li";
isLibrary = true;
isExecutable = true;
- buildDepends = [ base mtl transformers ];
+ buildDepends = [ base mtl tagged transformers ];
+ testDepends = [ base hspec transformers ];
homepage = "https://github.com/lspitzner/multistate";
- description = "like mtl's ReaderT/WriterT/StateT, but more than one contained value/type";
+ description = "like mtl's ReaderT / WriterT / StateT, but more than one contained value/type";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -89805,6 +90547,25 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "murmur3" = callPackage
+ ({ mkDerivation, base, base16-bytestring, binary, bytestring, HUnit
+ , QuickCheck, test-framework, test-framework-hunit
+ , test-framework-quickcheck2
+ }:
+ mkDerivation {
+ pname = "murmur3";
+ version = "1.0.0";
+ sha256 = "1rdnfy37dmmrqpapdv9h22ki94mxrz1xdk5ibcj833q35868kjmq";
+ buildDepends = [ base binary bytestring ];
+ testDepends = [
+ base base16-bytestring bytestring HUnit QuickCheck test-framework
+ test-framework-hunit test-framework-quickcheck2
+ ];
+ homepage = "http://github.com/plaprade/murmur3";
+ description = "Pure Haskell implementation of the MurmurHash3 x86_32 algorithm";
+ license = stdenv.lib.licenses.publicDomain;
+ }) {};
+
"murmurhash3" = callPackage
({ mkDerivation, haskell2010 }:
mkDerivation {
@@ -90208,8 +90969,8 @@ self: {
}:
mkDerivation {
pname = "mvc";
- version = "1.0.5";
- sha256 = "1lrq0nkxi0ljs6pxf7p4awhrf9ix9dqwvwsydph6fw356ypc39r2";
+ version = "1.1.0";
+ sha256 = "115cg7xlkk0zj3qdhwm35397vbp1s28h3j0ipw2a9i9ap16d7x1i";
buildDepends = [
async base contravariant foldl managed mmorph pipes
pipes-concurrency transformers
@@ -90225,8 +90986,10 @@ self: {
version = "1.2.0";
sha256 = "125bwc79qcmwb8dn8yqkrxlbqf3vwdzhjx66c69j2jbrp70061n6";
buildDepends = [ async base foldl mvc ];
+ jailbreak = true;
description = "Concurrent and combinable updates";
license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"mvclient" = callPackage
@@ -90546,6 +91309,23 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "namelist" = callPackage
+ ({ mkDerivation, base, case-insensitive, data-default-class, parsec
+ , QuickCheck, tasty, tasty-hunit, tasty-quickcheck
+ }:
+ mkDerivation {
+ pname = "namelist";
+ version = "0.1.0";
+ sha256 = "0sfiqd1dh3frzwnqz4fjh0wg8m55cprqw8ywvcaszrp5gq3mj74s";
+ buildDepends = [ base case-insensitive data-default-class parsec ];
+ testDepends = [
+ base case-insensitive QuickCheck tasty tasty-hunit tasty-quickcheck
+ ];
+ homepage = "https://github.com/philopon/namelist-hs";
+ description = "fortran90 namelist parser/pretty printer";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"names" = callPackage
({ mkDerivation, base, template-haskell }:
mkDerivation {
@@ -90895,6 +91675,18 @@ self: {
license = stdenv.lib.licenses.gpl3;
}) { inherit (pkgs) ncurses;};
+ "ndjson-conduit" = callPackage
+ ({ mkDerivation, aeson, attoparsec, base, bytestring, conduit }:
+ mkDerivation {
+ pname = "ndjson-conduit";
+ version = "0.1.0.2";
+ sha256 = "0fxxnbccasyhxd5yykzkvrj09zci8is7yqfjw0wg11n1p00hzahj";
+ buildDepends = [ aeson attoparsec base bytestring conduit ];
+ homepage = "https://github.com/srijs/haskell-ndjson-conduit";
+ description = "Conduit-based parsing and serialization for newline delimited JSON";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"neat" = callPackage
({ mkDerivation, base, filepath, parsec }:
mkDerivation {
@@ -91139,6 +91931,23 @@ self: {
license = stdenv.lib.licenses.gpl3;
}) {};
+ "nestedmap" = callPackage
+ ({ mkDerivation, base, base-unicode-symbols, containers
+ , data-ordlist, hspec, QuickCheck
+ }:
+ mkDerivation {
+ pname = "nestedmap";
+ version = "0.1.0.3";
+ sha256 = "1his95sqzyr5xb7iihz62vp9y32smf5wy4ck81yrxdvkn6zvhajl";
+ buildDepends = [ base base-unicode-symbols containers ];
+ testDepends = [
+ base base-unicode-symbols containers data-ordlist hspec QuickCheck
+ ];
+ jailbreak = true;
+ description = "A library for nested maps";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"net-concurrent" = callPackage
({ mkDerivation, base, bytestring, containers, ghc-binary, hslogger
, monad-loops, network
@@ -91334,8 +92143,8 @@ self: {
}:
mkDerivation {
pname = "nettle";
- version = "0.1.0";
- sha256 = "1ms96laa9d2ns39ymw6mlwm0mj03vss7855cs9npymhb4fmqkcas";
+ version = "0.1.1";
+ sha256 = "1l9515ks41b9rkcxv91d391lwl87k2ipl3j5qfjcdz1qaxrnjkyr";
buildDepends = [
base byteable bytestring crypto-cipher-types securemem tagged
];
@@ -91516,17 +92325,18 @@ self: {
({ mkDerivation, attoparsec, base, base32string, bytestring
, exceptions, hexstring, hspec, hspec-attoparsec
, hspec-expectations, network, network-attoparsec, network-simple
- , socks, text, transformers
+ , socks, splice, text, transformers
}:
mkDerivation {
pname = "network-anonymous-tor";
- version = "0.9.1";
- sha256 = "1p78xsi1i59z9jkyf182gvfx7qpiqs0l60mp2xl1d4jjwgdnni50";
+ version = "0.9.2";
+ sha256 = "1zssb8npwnzj8mra8pkvshni7h36wqhddva9rrwbq480492sck1w";
isLibrary = true;
isExecutable = true;
buildDepends = [
attoparsec base base32string bytestring exceptions hexstring
- network network-attoparsec network-simple socks text transformers
+ network network-attoparsec network-simple socks splice text
+ transformers
];
testDepends = [
attoparsec base base32string bytestring exceptions hspec
@@ -93643,6 +94453,18 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "old-version" = callPackage
+ ({ mkDerivation, base }:
+ mkDerivation {
+ pname = "old-version";
+ version = "1.1.0";
+ sha256 = "1vlh6wz9khcamlb5pv5gy5bss7bws7b92j8kkyqf6cp22x4dxdlc";
+ buildDepends = [ base ];
+ jailbreak = true;
+ description = "Basic versioning library";
+ license = "unknown";
+ }) {};
+
"olwrapper" = callPackage
({ mkDerivation, base, bytestring, fay, fay-jquery, fay-text, lens
, mtl, snap, snap-core, snap-loader-dynamic, snap-loader-static
@@ -94388,31 +95210,33 @@ self: {
"opml-conduit" = callPackage
({ mkDerivation, base, case-insensitive, conduit
- , conduit-combinators, containers, data-default, exceptions
- , hashable, hashable-time, hlint, lens, mono-traversable
- , monoid-subclasses, mtl, network-uri, QuickCheck
- , quickcheck-instances, resourcet, semigroups, tasty, tasty-hunit
- , tasty-quickcheck, text, time, timerep, unordered-containers
- , xml-conduit, xml-types
+ , conduit-combinators, conduit-parse, containers, data-default
+ , exceptions, hashable, hashable-time, hlint, lens
+ , mono-traversable, monoid-subclasses, mtl, network-uri, parsers
+ , QuickCheck, quickcheck-instances, resourcet, semigroups, tasty
+ , tasty-hunit, tasty-quickcheck, text, time, timerep
+ , unordered-containers, xml-conduit, xml-conduit-parse, xml-types
}:
mkDerivation {
pname = "opml-conduit";
- version = "0.2.0.1";
- sha256 = "1c787c8hq68g2zl1jji6bh2p8hm9fmpdcs898kr8n7b8xbw9jxfk";
+ version = "0.3.0.0";
+ sha256 = "00kknysgzv1cbrgx1sgb2qg99lr3715mhdx2wcjsi65msk67ngiz";
buildDepends = [
- base case-insensitive conduit containers data-default exceptions
- hashable hashable-time lens mono-traversable monoid-subclasses
- network-uri QuickCheck quickcheck-instances semigroups text time
- timerep unordered-containers xml-conduit xml-types
+ base case-insensitive conduit conduit-parse containers data-default
+ exceptions hashable hashable-time lens mono-traversable
+ monoid-subclasses network-uri parsers QuickCheck
+ quickcheck-instances semigroups text time timerep
+ unordered-containers xml-conduit xml-conduit-parse xml-types
];
testDepends = [
- base conduit conduit-combinators containers exceptions hlint lens
- mtl network-uri resourcet tasty tasty-hunit tasty-quickcheck
- xml-conduit
+ base conduit conduit-combinators conduit-parse containers
+ data-default exceptions hlint lens mtl network-uri parsers
+ resourcet tasty tasty-hunit tasty-quickcheck xml-conduit-parse
];
homepage = "https://github.com/k0ral/opml-conduit";
description = "Streaming parser/renderer for the OPML 2.0 format.";
license = "unknown";
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"opn" = callPackage
@@ -94506,6 +95330,17 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "optional-args" = callPackage
+ ({ mkDerivation, base }:
+ mkDerivation {
+ pname = "optional-args";
+ version = "1.0.0";
+ sha256 = "0j49cp5y7gp9acvhw315lq92mgr35fwaw90vpxy0n9g541ls350z";
+ buildDepends = [ base ];
+ description = "Optional function arguments";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"options" = callPackage
({ mkDerivation, base, chell, chell-quickcheck, containers
, monads-tf, transformers
@@ -94678,15 +95513,21 @@ self: {
}) {};
"order-maintenance" = callPackage
- ({ mkDerivation, base, containers, transformers }:
+ ({ mkDerivation, base, Cabal, cabal-test-quickcheck, containers
+ , QuickCheck, transformers
+ }:
mkDerivation {
pname = "order-maintenance";
- version = "0.0.0.0";
- sha256 = "1d416a277fcchcgyn4n5m7kpn0aky8gsi8fkk0gh3a4lcap18h2d";
+ version = "0.0.1.0";
+ sha256 = "01j8caxlmzz04qabinq5kcjdsr1855lmcdsi9sqn9zf79s16q97k";
buildDepends = [ base containers transformers ];
+ testDepends = [
+ base Cabal cabal-test-quickcheck containers QuickCheck transformers
+ ];
homepage = "http://darcs.wolfgang.jeltsch.info/haskell/order-maintenance";
description = "Algorithms for the order maintenance problem with a safe interface";
license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"order-statistics" = callPackage
@@ -94764,8 +95605,8 @@ self: {
}:
mkDerivation {
pname = "orgmode-parse";
- version = "0.1.1.1";
- sha256 = "17slf2i7k8bk1d47l165awn38dlpq2rdw6glzvp8if1dir2l2jl7";
+ version = "0.1.1.2";
+ sha256 = "1ys9gcydipjxn5ba7ndmz70ri218d6wivxrd7xvcsf4kncfks3xi";
buildDepends = [
aeson attoparsec base bytestring containers free hashable
old-locale text thyme unordered-containers
@@ -94928,6 +95769,7 @@ self: {
sha256 = "0mv9iakq1yjawf7f0zckmxbzlcv2rlqngsllfsrcydi6lxazznzw";
buildDepends = [ base ];
testDepends = [ base doctest ];
+ jailbreak = true;
description = "An alternative to some of the Prelude";
license = stdenv.lib.licenses.mit;
}) {};
@@ -95005,8 +95847,8 @@ self: {
}:
mkDerivation {
pname = "packed-dawg";
- version = "0.2.0.5";
- sha256 = "1b8lhigpzj1zvah6f4ra7pczhpm8dxcwaqna8p1ifbbx2ys6x59p";
+ version = "0.2.0.7";
+ sha256 = "03wf6pnv2l7aydxzv0gx073324iy5j7pbfh5nl3p5xdpr8y8il7y";
buildDepends = [
base binary deepseq mtl unordered-containers vector
vector-binary-instances
@@ -95167,6 +96009,22 @@ self: {
license = "unknown";
}) {};
+ "pagure-hook-receiver" = callPackage
+ ({ mkDerivation, base, containers, scotty, shelly, text
+ , transformers, unix
+ }:
+ mkDerivation {
+ pname = "pagure-hook-receiver";
+ version = "0.1.0.0";
+ sha256 = "0qnnkxcad4843v6c1fqqkiip6cv82q5fckpn5v40sw2p9xk3lkcl";
+ buildDepends = [
+ base containers scotty shelly text transformers unix
+ ];
+ homepage = "https://pagure.io/pagure-hook-receiver";
+ description = "Receive hooks from pagure and do things with them";
+ license = stdenv.lib.licenses.bsd2;
+ }) {};
+
"palette" = callPackage
({ mkDerivation, array, base, colour, containers }:
mkDerivation {
@@ -95242,8 +96100,8 @@ self: {
}:
mkDerivation {
pname = "pandoc";
- version = "1.14.0.3";
- sha256 = "1nbicmngsdx9v4kvsswipf8w1l8rvfsll8fnp2ar5v65b0aba3ic";
+ version = "1.14.0.4";
+ sha256 = "1pzs4ysf7q3sxd8vyydzi5r4n8gjnkvjs3p1phmw4zir3zxmp581";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -95277,8 +96135,8 @@ self: {
}:
mkDerivation {
pname = "pandoc-citeproc";
- version = "0.7.1.1";
- sha256 = "1n96g7l16cn1qcp9xsbdmp844078lpcjsz3lg1x81drnzax9fpa1";
+ version = "0.7.2";
+ sha256 = "0dpr74alkz9vy5yc09bnqb968hcrqys2xlydjda1g3qsarjg7p9y";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -95291,7 +96149,6 @@ self: {
aeson base bytestring directory filepath pandoc pandoc-types
process temporary text yaml
];
- jailbreak = true;
description = "Supports using pandoc with citeproc";
license = stdenv.lib.licenses.bsd3;
}) {};
@@ -95302,8 +96159,8 @@ self: {
}:
mkDerivation {
pname = "pandoc-crossref";
- version = "0.1.2.0";
- sha256 = "0q9ia1nzmzv1q8hplrmxszwk49mlp4v8skbfv4ggsl8s0vxc1c6f";
+ version = "0.1.2.1";
+ sha256 = "1hr2jfbzanpqbkvsfcbzvlfsnzba11hdrmvc3j63fwqk931qi2jm";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -95322,10 +96179,10 @@ self: {
({ mkDerivation, base, csv, pandoc, pandoc-types, text }:
mkDerivation {
pname = "pandoc-csv2table";
- version = "1.0.0";
+ version = "1.0.1";
revision = "1";
- sha256 = "0jr18sa5apvy8jckb5cxvsyr6c2drii6652ipwpd4xkdwrabwp5r";
- editedCabalFile = "49799682e063ffa396f94dd2f91e9b252f0224544d2e7a9d1dc5b41a909efd3d";
+ sha256 = "0b4xszf9bzfhrjgy2cymryab58zhh4jwv9p8g2hiqgrxix8jr1qb";
+ editedCabalFile = "0924cc418394f855f93486ee6fb3bae991112c3e63df74f95afa6c2d62b09299";
isLibrary = true;
isExecutable = true;
buildDepends = [ base csv pandoc pandoc-types text ];
@@ -96278,8 +97135,8 @@ self: {
}:
mkDerivation {
pname = "paypal-adaptive-hoops";
- version = "0.11.0.0";
- sha256 = "0v72ny33mfi29vv4kzld5x01qr9k6i9vdyk9v83dy9zbfb7vkmzv";
+ version = "0.11.0.1";
+ sha256 = "061vzsncyl0is2d3p8sh3a1wb46g2v6vqgdh390b8d41max1wabg";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -97013,8 +97870,8 @@ self: {
}:
mkDerivation {
pname = "persistent";
- version = "2.1.6";
- sha256 = "17jcj5xvxnck93dk01ac31mbh1b5pk1266x1zqap40glqs247myl";
+ version = "2.2";
+ sha256 = "04l5394yrnm0d5cz7nq2phmsbm5vxbggn4wp8n0i0ms0y7blfh0p";
buildDepends = [
aeson attoparsec base base64-bytestring blaze-html blaze-markup
bytestring conduit containers exceptions fast-logger lifted-base
@@ -97122,8 +97979,8 @@ self: {
}:
mkDerivation {
pname = "persistent-mysql";
- version = "2.1.3.1";
- sha256 = "1q1h3yrrpw9qzc7myfhwjxn5kxky5bxf918fyllpnprdagf98gd1";
+ version = "2.2";
+ sha256 = "09hajfvwgjkrmk1qmjfx3z6qkisv4gj0qjcmd1m8n9nb76bmdfz9";
buildDepends = [
aeson base blaze-builder bytestring conduit containers
monad-control monad-logger mysql mysql-simple persistent resourcet
@@ -97164,8 +98021,8 @@ self: {
}:
mkDerivation {
pname = "persistent-postgresql";
- version = "2.1.6";
- sha256 = "1s3dzwxv1rzfg7f5l9qsypzvm7pk2jiqjzdfksiq0ji37f73v7l6";
+ version = "2.2";
+ sha256 = "0ydwc2jb8w3wma8f0v7i16pzglx0gv1ffikfvislw3c6wkangwby";
buildDepends = [
aeson base blaze-builder bytestring conduit containers
monad-control monad-logger persistent postgresql-libpq
@@ -97252,8 +98109,8 @@ self: {
}:
mkDerivation {
pname = "persistent-sqlite";
- version = "2.1.4.2";
- sha256 = "0g0j8yhbr960lvph49x5knwvx86b7kxlihk8n0xvdqbaq04fgiqa";
+ version = "2.2";
+ sha256 = "1567ja3f87syw6x6x6gl6xzdl3pl8ammlrqy2500gbgr7ni0a47i";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -97276,8 +98133,8 @@ self: {
}:
mkDerivation {
pname = "persistent-template";
- version = "2.1.3.3";
- sha256 = "1p9vndchcd06ajqmqmf3pw5ql9r6jqbs9xl5jxv1x0pjvbq6yjy5";
+ version = "2.1.3.4";
+ sha256 = "0wi1mrcilz66jnlgz16crqlh4bibb03mj460bgg3af4f8zpwja2g";
buildDepends = [
aeson base bytestring containers ghc-prim monad-control
monad-logger path-pieces persistent tagged template-haskell text
@@ -97286,7 +98143,6 @@ self: {
testDepends = [
aeson base bytestring hspec persistent QuickCheck text transformers
];
- jailbreak = true;
homepage = "http://www.yesodweb.com/book/persistent";
description = "Type-safe, non-relational, multi-backend persistence";
license = stdenv.lib.licenses.mit;
@@ -97619,15 +98475,14 @@ self: {
}:
mkDerivation {
pname = "phash";
- version = "0.0.3";
- sha256 = "0w3c7i4n4f12nkg0bqvm568s2y1fdgaicxqr3ky80lygbz1h20hw";
+ version = "0.0.4";
+ sha256 = "1bfikigj8bxgqwqz0lxi35s8sck41kjkz2ww1s10bim867h97si0";
buildDepends = [ base ];
testDepends = [
base doctest HUnit pHash smallcheck tasty tasty-hunit
tasty-smallcheck
];
extraLibraries = [ pHash ];
- jailbreak = true;
homepage = "http://github.com/michaelxavier/phash";
description = "Haskell bindings to pHash, the open source perceptual hash library";
license = stdenv.lib.licenses.gpl3;
@@ -98251,6 +99106,19 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "pipes-mongodb" = callPackage
+ ({ mkDerivation, base, monad-control, mongoDB, pipes, text }:
+ mkDerivation {
+ pname = "pipes-mongodb";
+ version = "0.1.0.0";
+ sha256 = "0h4334fajrza7r8jrr78nqhs522kxnbzdj0gnbp7ndvzvx5ij888";
+ buildDepends = [ base monad-control mongoDB pipes ];
+ testDepends = [ base monad-control mongoDB pipes text ];
+ homepage = "http://github.com/jb55/pipes-mongodb";
+ description = "Stream results from MongoDB";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"pipes-network" = callPackage
({ mkDerivation, base, bytestring, network, network-simple, pipes
, pipes-safe, transformers
@@ -98937,6 +99805,7 @@ self: {
];
description = "Multi-backend (zookeeper and sqlite) DNS Server using persistent-library";
license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"pointed" = callPackage
@@ -99155,16 +100024,16 @@ self: {
}) {};
"poly-arity" = callPackage
- ({ mkDerivation, base, constraints, hspec, QuickCheck
+ ({ mkDerivation, base, constraints, HList, hspec, QuickCheck
, quickcheck-instances
}:
mkDerivation {
pname = "poly-arity";
- version = "0.0.4";
- revision = "1";
- sha256 = "0cg312hlfylablw4h840xhm72cs70xk9rla4wrmzpqm45g91fhyq";
- editedCabalFile = "e099e3cdd06f5ab832bfc920265cd97304f92c2e89126306f7e1d9bff98cbe86";
- buildDepends = [ base constraints ];
+ version = "0.0.4.1";
+ revision = "2";
+ sha256 = "15yl8mqwahbrwl0hmz6lb4k7i48qgnxhav7xalj4q541ghd7cnwp";
+ editedCabalFile = "0bce1ff7388433830c7824530bb9c4fe3f4545bad44683dec2a5780028d870af";
+ buildDepends = [ base constraints HList ];
testDepends = [ base hspec QuickCheck quickcheck-instances ];
description = "Tools for working with functions of undetermined arity";
license = stdenv.lib.licenses.bsd3;
@@ -99755,13 +100624,12 @@ self: {
}:
mkDerivation {
pname = "postgresql-config";
- version = "0.0.1";
- sha256 = "1hp6ki078d4hvb910403ppvcb8q6ji79z3ccv6alkpnd494wd4wr";
+ version = "0.0.2";
+ sha256 = "1b7rppzarnmndmgwkcahcrcnxzigfldm50iqd81vj0zkii6w0i43";
buildDepends = [
aeson base bytestring monad-control mtl postgresql-simple
resource-pool time
];
- jailbreak = true;
homepage = "https://bitbucket.org/s9gf4ult/postgresql-config";
description = "Types for easy adding postgresql configuration to your program";
license = stdenv.lib.licenses.bsd3;
@@ -99920,6 +100788,21 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "postgresql-simple-url" = callPackage
+ ({ mkDerivation, base, network-uri, postgresql-simple, split, tasty
+ , tasty-quickcheck
+ }:
+ mkDerivation {
+ pname = "postgresql-simple-url";
+ version = "0.1.0.1";
+ sha256 = "1878zcfgis931nn5pnbixzfj2sbp790rxq294cwjy6g1ab35w5ng";
+ buildDepends = [ base network-uri postgresql-simple split ];
+ testDepends = [ base postgresql-simple tasty tasty-quickcheck ];
+ homepage = "https://github.com/futurice/postgresql-simple-url";
+ description = "PostgreSQL";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"postgresql-typed" = callPackage
({ mkDerivation, aeson, array, attoparsec, base, binary, bytestring
, containers, cryptohash, haskell-src-meta, network, old-locale
@@ -99957,8 +100840,8 @@ self: {
}:
mkDerivation {
pname = "postgrest";
- version = "0.2.9.1";
- sha256 = "0rgvqhhpg6q99q1bdbk3dhnlad8nfrl3xihcg3c0j55dlx3q1860";
+ version = "0.2.10.0";
+ sha256 = "0s1nmdpdjylqb6lmb9ijh83pfjyf8j6dkagl3rzl4dxc97w6fbpy";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -100049,6 +100932,34 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) { inherit (pkgs) adns; inherit (pkgs) openssl;};
+ "potrace" = callPackage
+ ({ mkDerivation, base, bindings-potrace, bytestring, containers
+ , data-default, JuicyPixels, vector
+ }:
+ mkDerivation {
+ pname = "potrace";
+ version = "0.1.0.0";
+ sha256 = "1frxf3jzjyyp3bfj6b2mi29fxwcml4bya6sn4c5aizg741dhphng";
+ buildDepends = [
+ base bindings-potrace bytestring containers data-default
+ JuicyPixels vector
+ ];
+ description = "Trace bitmap images to paths using potrace";
+ license = stdenv.lib.licenses.gpl2;
+ }) {};
+
+ "potrace-diagrams" = callPackage
+ ({ mkDerivation, base, diagrams-lib, JuicyPixels, potrace }:
+ mkDerivation {
+ pname = "potrace-diagrams";
+ version = "0.1.0.0";
+ sha256 = "0ys70a5k384czz0c6bpyy0cqrk35wa1yg6ph19smhm3ag9d8161v";
+ buildDepends = [ base diagrams-lib JuicyPixels potrace ];
+ homepage = "http://projects.haskell.org/diagrams/";
+ description = "Potrace bindings for the diagrams library";
+ license = stdenv.lib.licenses.gpl2;
+ }) {};
+
"powermate" = callPackage
({ mkDerivation, base, directory, network, unix }:
mkDerivation {
@@ -100865,8 +101776,8 @@ self: {
}:
mkDerivation {
pname = "process-extras";
- version = "0.3.3.4";
- sha256 = "1cnq7lzrwckyhd829ir8h1rbh404yw0m40lka7sl23i7mak51mbp";
+ version = "0.3.3.5";
+ sha256 = "18fyv47xhvw5881is2hk9a1x35fr21jvw36irlc5cxc3vfmnym6s";
buildDepends = [ base bytestring deepseq ListLike process text ];
homepage = "https://github.com/seereason/process-extras";
description = "Process extras";
@@ -101379,8 +102290,8 @@ self: {
}:
mkDerivation {
pname = "propellor";
- version = "2.4.0";
- sha256 = "1l2zhj12jwsavljx0r6qmz44w7k5bwckwg2wcz38qd6km4wy3ppw";
+ version = "2.5.0";
+ sha256 = "120pamm3rg2iahbl23y90wbcwdhgjvvsfzlkhi61c97xfybvb08c";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -101602,8 +102513,8 @@ self: {
}:
mkDerivation {
pname = "proton-haskell";
- version = "0.6";
- sha256 = "0g73lspx5rk8d6axn229im7r8ch5d7afn8fb51haazaqmcw906qg";
+ version = "0.7";
+ sha256 = "1gn4h8xprq8gkngccyqbbqn8nidwlczlwckxzjgnb190yy3kd7hi";
buildDepends = [ base containers directory filepath ];
testDepends = [
base containers directory filepath HUnit test-framework
@@ -102566,8 +103477,8 @@ self: {
}:
mkDerivation {
pname = "quantfin";
- version = "0.1.0.2";
- sha256 = "1m6208c8gxbm95a99kk0chh62bk2zb1fmwrdd7fwl7zpwzr8iany";
+ version = "0.2.0.0";
+ sha256 = "0s9wmkngz31wrllffk3i8y66f60liajwhapih7mnriyfvqqsb6ra";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -102880,6 +103791,17 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "quickcheck-simple" = callPackage
+ ({ mkDerivation, base, QuickCheck }:
+ mkDerivation {
+ pname = "quickcheck-simple";
+ version = "0.1.0.0";
+ sha256 = "0vnxyb3qz8i1rpmkga6151cld1jr3kiyv3xrhg814mhf1fmhb8xl";
+ buildDepends = [ base QuickCheck ];
+ description = "Test properties and default-mains for QuickCheck";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"quickcheck-unicode" = callPackage
({ mkDerivation, base, QuickCheck }:
mkDerivation {
@@ -103244,6 +104166,22 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "raml" = callPackage
+ ({ mkDerivation, aeson, base, bytestring, text
+ , unordered-containers, yaml
+ }:
+ mkDerivation {
+ pname = "raml";
+ version = "0.1.0";
+ sha256 = "02c1rki7azfwfiawi29z5gp1zwfdx46rw17bifpklw7zya525pr9";
+ buildDepends = [
+ aeson base bytestring text unordered-containers yaml
+ ];
+ homepage = "https://github.com/fnoble/raml";
+ description = "RESTful API Modeling Language (RAML) library for Haskell";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"rand-vars" = callPackage
({ mkDerivation, array, base, IntervalMap, mtl, random }:
mkDerivation {
@@ -103476,14 +104414,14 @@ self: {
}:
mkDerivation {
pname = "range";
- version = "0.1.0.1";
- sha256 = "04nzxjgjnql6bq30pkkmlxcj0cxmw3hlzb6y1fhb052rxmpaq8mk";
+ version = "0.1.1.0";
+ sha256 = "1cqy6lz7mr0n2zrrn9qxvgp8q7yj0drri1885m1crmvx4xd1dfp2";
buildDepends = [ base parsec ];
testDepends = [
base Cabal QuickCheck random test-framework
test-framework-quickcheck2
];
- jailbreak = true;
+ homepage = "https://bitbucket.org/robertmassaioli/range";
description = "This has a bunch of code for specifying and managing ranges in your code";
license = stdenv.lib.licenses.mit;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -103602,8 +104540,8 @@ self: {
}:
mkDerivation {
pname = "rasterific-svg";
- version = "0.2.3";
- sha256 = "1gr050dlvq8pfp77g21ywc6cknbgmkw8bcc4d8klw8jpf0ppar45";
+ version = "0.2.3.1";
+ sha256 = "00p3l8czj7l9jm6ibn9c6wb99v5j5x9ivgh3pamznqcri3lqy7kk";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -104193,19 +105131,18 @@ self: {
}) {};
"record" = callPackage
- ({ mkDerivation, attoparsec, base, base-prelude, directory, doctest
- , filepath, template-haskell, text, transformers
+ ({ mkDerivation, base, base-prelude, basic-lens, template-haskell
+ , transformers
}:
mkDerivation {
pname = "record";
- version = "0.3.1.2";
- sha256 = "02kpi21l2kwysk8qgxgl10ngqnmc0mx50qxf9jq0fmi8rv3fm9xp";
+ version = "0.4.0.2";
+ sha256 = "18j30j7dppm0lqf9p345bfz65cls15ka6jyflamwgig5h0dzz5mw";
buildDepends = [
- attoparsec base base-prelude template-haskell text transformers
+ base base-prelude basic-lens template-haskell transformers
];
- testDepends = [ base base-prelude directory doctest filepath ];
homepage = "https://github.com/nikita-volkov/record";
- description = "First class records implemented with quasi-quotation";
+ description = "Anonymous records";
license = stdenv.lib.licenses.mit;
}) {};
@@ -104248,6 +105185,46 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "record-preprocessor" = callPackage
+ ({ mkDerivation, base, base-prelude, conversion, conversion-text
+ , record-syntax, text
+ }:
+ mkDerivation {
+ pname = "record-preprocessor";
+ version = "0.1.0.0";
+ sha256 = "0ign3zvpnz4zrzfqglf34xbcrb21dq8hyzwkzlq9y26r9g3nmbd5";
+ isLibrary = false;
+ isExecutable = true;
+ buildDepends = [
+ base base-prelude conversion conversion-text record-syntax text
+ ];
+ homepage = "https://github.com/nikita-volkov/record-preprocessor";
+ description = "Compiler preprocessor introducing a syntactic extension for anonymous records";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
+ "record-syntax" = callPackage
+ ({ mkDerivation, base, base-prelude, conversion, conversion-text
+ , directory, doctest, filepath, haskell-src-exts, hspec, parsec
+ , record, template-haskell, text, transformers
+ }:
+ mkDerivation {
+ pname = "record-syntax";
+ version = "0.1.0.0";
+ sha256 = "115z96ific9n3612yzkfmj7hxnbjc8xjz5nmfiddklx9zjih7h40";
+ buildDepends = [
+ base base-prelude conversion conversion-text haskell-src-exts
+ parsec record template-haskell text transformers
+ ];
+ testDepends = [
+ base base-prelude directory doctest filepath hspec record
+ ];
+ jailbreak = true;
+ homepage = "https://github.com/nikita-volkov/record-syntax";
+ description = "A library for parsing and processing the Haskell syntax sprinkled with anonymous records";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"records" = callPackage
({ mkDerivation, base, kinds, type-functions }:
mkDerivation {
@@ -104284,8 +105261,8 @@ self: {
({ mkDerivation, base, comonad, free, transformers }:
mkDerivation {
pname = "recursion-schemes";
- version = "4.1.1";
- sha256 = "00izjknk7g2546p35hrha413nji6013wfbjic8jgmlzzjlr1cjwl";
+ version = "4.1.2";
+ sha256 = "1z64r20qgf7n5c2529cpwhklb3nkmw01p2llq903dqkplmbi7z9n";
buildDepends = [ base comonad free transformers ];
homepage = "http://github.com/ekmett/recursion-schemes/";
description = "Generalized bananas, lenses and barbed wire";
@@ -104434,20 +105411,18 @@ self: {
}) {};
"reducers" = callPackage
- ({ mkDerivation, array, base, bytestring, comonad, containers
- , fingertree, hashable, keys, pointed, semigroupoids, semigroups
- , text, transformers, unordered-containers
+ ({ mkDerivation, array, base, bytestring, containers, fingertree
+ , hashable, semigroupoids, semigroups, text, transformers
+ , unordered-containers
}:
mkDerivation {
pname = "reducers";
- version = "3.10.3.1";
- sha256 = "0qmd93jdh0qjyc9if9hr2yjanrqx5nlbz5j0daiywzxcb0hi7ri8";
+ version = "3.10.3.2";
+ sha256 = "1zfryrmz5ajahs4d6dj3fzzkqbgdzqz358jvj4rhqiwa61ylhb42";
buildDepends = [
- array base bytestring comonad containers fingertree hashable keys
- pointed semigroupoids semigroups text transformers
- unordered-containers
+ array base bytestring containers fingertree hashable semigroupoids
+ semigroups text transformers unordered-containers
];
- jailbreak = true;
homepage = "http://github.com/ekmett/reducers/";
description = "Semigroups, specialized containers and a general map/reduce framework";
license = stdenv.lib.licenses.bsd3;
@@ -104969,7 +105944,9 @@ self: {
mkDerivation {
pname = "regex-tdfa";
version = "1.2.0";
+ revision = "1";
sha256 = "00gl9sx3hzd83lp38jlcj7wvzrda8kww7njwlm1way73m8aar0pw";
+ editedCabalFile = "5489b69b9f0e8e181ee5134fd500bb0e2b4f914234c5223c59186035fb50478e";
buildDepends = [
array base bytestring containers ghc-prim mtl parsec regex-base
];
@@ -105418,8 +106395,8 @@ self: {
}:
mkDerivation {
pname = "relational-query";
- version = "0.5.0.0";
- sha256 = "00q0z4bnic5phhm7xxv059380q23d0fhd8vh32aggjlggzlq01sx";
+ version = "0.5.0.1";
+ sha256 = "1yhcdc0m839pdwhb2vv25wz1vbhk5ynfkb9d6xgkjymsjvqlp78n";
buildDepends = [
array base bytestring containers dlist names-th persistable-record
sql-words template-haskell text time time-locale-compat
@@ -106542,8 +107519,8 @@ self: {
}:
mkDerivation {
pname = "rethinkdb";
- version = "1.16.0.0";
- sha256 = "125gg719isf60yv5yj0frkg92bp42cb43d4qzs7jqic1wvhx32yy";
+ version = "2.0.0.0";
+ sha256 = "09digdn4a9vsmanpj6d2wn6kh59r05cfwjk4xq22iszzjrxami6d";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -106552,9 +107529,8 @@ self: {
unordered-containers utf8-string vector
];
testDepends = [ base doctest ];
- jailbreak = true;
homepage = "http://github.com/atnnn/haskell-rethinkdb";
- description = "A driver for RethinkDB 1.16";
+ description = "A driver for RethinkDB 2.0";
license = stdenv.lib.licenses.asl20;
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
@@ -106883,6 +107859,30 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "riemann" = callPackage
+ ({ mkDerivation, base, cereal, containers, data-default, either
+ , errors, HUnit, lens, network, protobuf, QuickCheck
+ , test-framework, test-framework-hunit, test-framework-quickcheck2
+ , text, time, transformers
+ }:
+ mkDerivation {
+ pname = "riemann";
+ version = "0.1.0.1";
+ sha256 = "0d36ff839g7y1lm8dg5j5s1vdxr1hqbyjxh7gsfjca00a0cgy5xa";
+ buildDepends = [
+ base cereal containers data-default either errors lens network
+ protobuf text time transformers
+ ];
+ testDepends = [
+ base either errors HUnit QuickCheck test-framework
+ test-framework-hunit test-framework-quickcheck2 transformers
+ ];
+ jailbreak = true;
+ homepage = "https://github.com/telser/riemann-hs";
+ description = "A Riemann client for Haskell";
+ license = stdenv.lib.licenses.mit;
+ }) {};
+
"riff" = callPackage
({ mkDerivation, base, binary, bytestring, either, filepath
, transformers
@@ -108112,6 +109112,24 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "safe-printf" = callPackage
+ ({ mkDerivation, base, doctest, haskell-src-meta, hspec, QuickCheck
+ , template-haskell, th-lift
+ }:
+ mkDerivation {
+ pname = "safe-printf";
+ version = "0.1.0.0";
+ sha256 = "19nw306q7xlj6s132qxlfskg67x6rx3zhsk2n6lbz2kryr7v99g6";
+ buildDepends = [ base haskell-src-meta template-haskell th-lift ];
+ testDepends = [
+ base doctest haskell-src-meta hspec QuickCheck template-haskell
+ th-lift
+ ];
+ homepage = "https://github.com/konn/safe-printf";
+ description = "Well-typed, flexible and variadic printf for Haskell";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"safecopy" = callPackage
({ mkDerivation, array, base, bytestring, cereal, containers, lens
, lens-action, old-time, quickcheck-instances, tasty
@@ -108926,8 +109944,8 @@ self: {
}:
mkDerivation {
pname = "schedule-planner";
- version = "1.0.0.0";
- sha256 = "0cbx6k3spsdsk8bjwyzyjw9iqdpc7z2vkds51iaxxn3wiwjkxwpq";
+ version = "1.0.1.0";
+ sha256 = "0vlr4wwazpr7xf5pym2f42gwniy017h02wwymn0zn80wypiv6dz1";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -109675,8 +110693,8 @@ self: {
}:
mkDerivation {
pname = "sdr";
- version = "0.1.0.2";
- sha256 = "17i16f9pgd8a2l9ywl516zh29mmk5z08j964blajl46wr38g320j";
+ version = "0.1.0.3";
+ sha256 = "1whw45vnns0f5iw9vlmfxw90y3l0gp0q5yar6p6dp1dn57gyrdkc";
buildDepends = [
array base bytestring cairo cereal Chart Chart-cairo colour
containers Decimal dynamic-graph either fftwRaw GLFW-b OpenGL
@@ -109797,8 +110815,8 @@ self: {
}:
mkDerivation {
pname = "second-transfer";
- version = "0.5.3.1";
- sha256 = "1ng3a384y3hsm6xgw8mhchkgz8xdgrk35b44lbifdfilcmmq7nrv";
+ version = "0.5.3.2";
+ sha256 = "0qc6xm7c37n2r9xnqc6njkm2d8lkwmripcr3q1q4m7q97qsvjbdl";
buildDepends = [
attoparsec base base16-bytestring binary bytestring conduit
containers exceptions hashable hashtables hslogger http2 lens
@@ -109890,8 +110908,8 @@ self: {
({ mkDerivation, base, byteable, bytestring, ghc-prim, memory }:
mkDerivation {
pname = "securemem";
- version = "0.1.8";
- sha256 = "14q5p464vks942k4q5dl4gyi9asg3d8rl8kd84qgbrvvr3ymhxb2";
+ version = "0.1.9";
+ sha256 = "0dkhhjxa7njc3qbgvd5a23rkvr39vj2kn2a9nk6yjg7a8b2hvdpy";
buildDepends = [ base byteable bytestring ghc-prim memory ];
homepage = "http://github.com/vincenthz/hs-securemem";
description = "abstraction to an auto scrubbing and const time eq, memory chunk";
@@ -110051,15 +111069,14 @@ self: {
}:
mkDerivation {
pname = "semigroupoids";
- version = "5.0.0.1";
- revision = "1";
- sha256 = "0njand5df3ri7pr0jd12z7dfvcfw6xdm7z5ap0b4xcpy47ndcw8l";
- editedCabalFile = "30bb2d94a228945d3d719a7004d79c218479dbdf31f1e92f730378af57fd6575";
+ version = "5.0.0.2";
+ sha256 = "14q7284gq44h86j6jxi7pz1hxwfal0jgv6i2j1v2hdzqfnd8z5sw";
buildDepends = [
base base-orphans bifunctors comonad containers contravariant
distributive semigroups tagged transformers transformers-compat
];
testDepends = [ base directory doctest filepath ];
+ jailbreak = true;
homepage = "http://github.com/ekmett/semigroupoids";
description = "Semigroupoids: Category sans id";
license = stdenv.lib.licenses.bsd3;
@@ -110514,8 +111531,8 @@ self: {
}:
mkDerivation {
pname = "servant";
- version = "0.4.1";
- sha256 = "0rbbijy1y40msy0ficssfg0krylrma55z500anymjkmpyp3ymnls";
+ version = "0.4.2";
+ sha256 = "0zna0x70jlxa2nis4v6knqlyxxkyvv2lmwyixp31xhdcp1yl2lqh";
buildDepends = [
aeson attoparsec base bytestring bytestring-conversion
case-insensitive http-media http-types network-uri
@@ -110535,8 +111552,8 @@ self: {
({ mkDerivation, base, blaze-html, http-media, servant }:
mkDerivation {
pname = "servant-blaze";
- version = "0.4.1";
- sha256 = "0an5lb3p61i8iahs5rgfy97s3ivqa3q0034iz8zxa4rvhy7k56hp";
+ version = "0.4.2";
+ sha256 = "0jank0v3cp6cbr571q4pqdfxfbfzm5v8r6rq8csz9yfkhg6x97bg";
buildDepends = [ base blaze-html http-media servant ];
homepage = "http://haskell-servant.github.io/";
description = "Blaze-html support for servant";
@@ -110552,8 +111569,8 @@ self: {
}:
mkDerivation {
pname = "servant-client";
- version = "0.4.1";
- sha256 = "1h0w9dkngrz9pimz66bc2ij9ik316x0sliyyqf16mmkpn66wcl6r";
+ version = "0.4.2";
+ sha256 = "0rcjqvx76mih4pfhxgrm30czznz68agdhflanqsslv2g33vzls55";
buildDepends = [
aeson attoparsec base bytestring either exceptions http-client
http-client-tls http-media http-types network-uri safe servant
@@ -110576,8 +111593,8 @@ self: {
}:
mkDerivation {
pname = "servant-docs";
- version = "0.4.1";
- sha256 = "0xhj75nbsnlbzp3sf6qkfwh0x6a64lfzzq9m07wfg02nqzn22y92";
+ version = "0.4.2";
+ sha256 = "1s70zrs8hiphz94vkcm9gim1xs4dj943a73d2jypyijd4p0k5q5j";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -110598,8 +111615,8 @@ self: {
}:
mkDerivation {
pname = "servant-ede";
- version = "0.4";
- sha256 = "0h1kvgp0hzn5zmvc5gys3n3w20gmjmsgdw4lmpk7qwg16x2kriwd";
+ version = "0.4.0.1";
+ sha256 = "1yxqjd6dk5bhh6qwjshm1fcizsm1vd5nk8sdbfdasgsfw6ynlgfp";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -110612,6 +111629,29 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "servant-examples" = callPackage
+ ({ mkDerivation, aeson, base, bytestring, directory, either
+ , http-types, js-jquery, lucid, random, servant, servant-client
+ , servant-docs, servant-jquery, servant-lucid, servant-server, text
+ , time, transformers, wai, wai-extra, warp
+ }:
+ mkDerivation {
+ pname = "servant-examples";
+ version = "0.4.2";
+ sha256 = "1nmgzkn0nv3p0bzr5ny0yx0g45fzf5qx7s868jp1nq7wbfd3yc0i";
+ isLibrary = false;
+ isExecutable = true;
+ buildDepends = [
+ aeson base bytestring directory either http-types js-jquery lucid
+ random servant servant-client servant-docs servant-jquery
+ servant-lucid servant-server text time transformers wai wai-extra
+ warp
+ ];
+ homepage = "http://haskell-servant.github.io/";
+ description = "Example programs for servant";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"servant-jquery" = callPackage
({ mkDerivation, aeson, base, charset, filepath, hspec
, hspec-expectations, language-ecmascript, lens, servant
@@ -110619,8 +111659,8 @@ self: {
}:
mkDerivation {
pname = "servant-jquery";
- version = "0.4.1";
- sha256 = "10w4fll46355w21l2jq3kd9lfsncdajc8s40j181s29kw6bq6r6n";
+ version = "0.4.2";
+ sha256 = "14ixqnxwm24gc457y0z7rw6z31w2s29sg913vvax641nazfr6yfm";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -110639,8 +111679,8 @@ self: {
({ mkDerivation, base, http-media, lucid, servant }:
mkDerivation {
pname = "servant-lucid";
- version = "0.4.1";
- sha256 = "02bggqwmpqznfnprfyfq6ia04byi23zgwvzigymaw1bykfi7z6h0";
+ version = "0.4.2";
+ sha256 = "1aapj4fwjijg9k56x5n9andfwfkffcv37rfvsbpdxhkvwzvmmdpq";
buildDepends = [ base http-media lucid servant ];
homepage = "http://haskell-servant.github.io/";
description = "Servant support for lucid";
@@ -110736,8 +111776,8 @@ self: {
}:
mkDerivation {
pname = "servant-server";
- version = "0.4.1";
- sha256 = "0bc82pn82ymv5wy1plmcgxb0ljkqj48rn9x8gdjdki06yvph63ga";
+ version = "0.4.2";
+ sha256 = "054xfkl6pxc39ahhch8i9s1aj2p3sd10ah9cknknbkjcyhynjzk4";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -110751,7 +111791,6 @@ self: {
network parsec QuickCheck servant string-conversions temporary text
transformers wai wai-extra warp
];
- jailbreak = true;
homepage = "http://haskell-servant.github.io/";
description = "A family of combinators for defining webservices APIs and serving them";
license = stdenv.lib.licenses.bsd3;
@@ -110783,18 +111822,16 @@ self: {
"ses-html" = callPackage
({ mkDerivation, base, base64-bytestring, blaze-html, byteable
- , bytestring, cryptohash, HsOpenSSL, http-streams, old-locale
- , tagsoup, time
+ , bytestring, cryptohash, HsOpenSSL, http-streams, tagsoup, time
}:
mkDerivation {
pname = "ses-html";
- version = "0.2.0.2";
- sha256 = "0dfrhsn6scwid7ycnq4j21nkq64s59hkc05ygcg4qsf7vcizgs0d";
+ version = "0.3.0.0";
+ sha256 = "1clf24kyyp9b8r22bacp44q0gf83zr6k1b33dz4bfy935wbnlshy";
buildDepends = [
base base64-bytestring blaze-html byteable bytestring cryptohash
- HsOpenSSL http-streams old-locale tagsoup time
+ HsOpenSSL http-streams tagsoup time
];
- jailbreak = true;
description = "Send HTML formatted emails using Amazon's SES REST API with blaze";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -111526,8 +112563,8 @@ self: {
({ mkDerivation, base, containers, text, unix }:
mkDerivation {
pname = "shell-monad";
- version = "0.6.3";
- sha256 = "0wfn1zwbqzwvbvh1x28rpgsvn8i2ff5r6v4i5kriiw025vdb5r2v";
+ version = "0.6.4";
+ sha256 = "1wmihv2x4pbz9bkrjyyh4hqwsdmlldmyi5jlgxx6ry6z3jyx9i13";
buildDepends = [ base containers text unix ];
description = "shell monad";
license = stdenv.lib.licenses.bsd3;
@@ -112340,8 +113377,8 @@ self: {
}:
mkDerivation {
pname = "simple-sendfile";
- version = "0.2.20";
- sha256 = "0fzxlj3nmlj9nyzl4ygn6q2rgwvcgjpkypp6cpka64bhqfrgqyb3";
+ version = "0.2.21";
+ sha256 = "0xzxcz60gl22w3rxjvw0s6js0g5mi6as1n48gl37dv4lbrn9s8v1";
buildDepends = [ base bytestring network unix ];
testDepends = [
base bytestring conduit conduit-extra directory hspec HUnit network
@@ -112619,6 +113656,25 @@ self: {
license = stdenv.lib.licenses.gpl3;
}) {};
+ "simplex-basic" = callPackage
+ ({ mkDerivation, base, bifunctors, containers, hspec
+ , linear-grammar, mtl, QuickCheck, transformers
+ }:
+ mkDerivation {
+ pname = "simplex-basic";
+ version = "0.0.0.1";
+ sha256 = "180bnrka1id16scz4zzi60m8692b7pyicfzfbzvi8rz1shl038zq";
+ buildDepends = [
+ base bifunctors linear-grammar mtl QuickCheck transformers
+ ];
+ testDepends = [
+ base bifunctors containers hspec linear-grammar mtl QuickCheck
+ transformers
+ ];
+ description = "Very basic simplex implementation";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"simseq" = callPackage
({ mkDerivation, base, bio, bytestring, random }:
mkDerivation {
@@ -112686,8 +113742,8 @@ self: {
}:
mkDerivation {
pname = "singletons";
- version = "1.1.2";
- sha256 = "102pxml8k1f94q8vmbsjhv6sjxa316xblfcl8czagcxkpz0sil4d";
+ version = "1.1.2.1";
+ sha256 = "1lxbajfwq65bkl73cr3zqzcqy67vqbq9sf8w9ckrik4713sx0mhb";
buildDepends = [ base containers mtl template-haskell th-desugar ];
testDepends = [
base Cabal constraints filepath process tasty tasty-golden
@@ -113426,14 +114482,14 @@ self: {
, clientsession, comonad, configurator, containers, directory
, directory-tree, dlist, errors, filepath, hashable, heist, lens
, logict, MonadCatchIO-transformers, mtl, mwc-random, old-time
- , pwstore-fast, regex-posix, snap-core, snap-server, stm, syb
+ , pwstore-fast, regex-posix, snap-core, snap-server, stm
, template-haskell, text, time, transformers, unordered-containers
, vector, vector-algorithms, xmlhtml
}:
mkDerivation {
pname = "snap";
- version = "0.14.0.4";
- sha256 = "0z0w6dig658cbl6adwq738dr9z56a3sj8lfhh5zfnmmy7x1794xs";
+ version = "0.14.0.5";
+ sha256 = "0wifww6mry2lxj572j9gwjxpjz4z7z9hd9jzhfyfwv2c67b39iyr";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -113441,8 +114497,8 @@ self: {
configurator containers directory directory-tree dlist errors
filepath hashable heist lens logict MonadCatchIO-transformers mtl
mwc-random old-time pwstore-fast regex-posix snap-core snap-server
- stm syb template-haskell text time transformers
- unordered-containers vector vector-algorithms xmlhtml
+ stm template-haskell text time transformers unordered-containers
+ vector vector-algorithms xmlhtml
];
jailbreak = true;
homepage = "http://snapframework.com/";
@@ -113851,17 +114907,18 @@ self: {
"snaplet-auth-acid" = callPackage
({ mkDerivation, acid-state, aeson, attoparsec, base, cereal
, clientsession, directory, errors, filepath, hashable, lens
- , MonadCatchIO-transformers, mtl, safecopy, snap, snap-core, text
- , time, unordered-containers, vector
+ , MonadCatchIO-transformers, mtl, safecopy, scientific, snap
+ , snap-core, text, time, unordered-containers, vector
}:
mkDerivation {
pname = "snaplet-auth-acid";
- version = "0.0.1";
- sha256 = "1f6p8iqb5cq2yz6c6zdd71p6cfkvnhqkczqiyb7080xira9w5ia3";
+ version = "0.1.0";
+ sha256 = "0i0py2rj2vkivl97fxnv87bpbsbms2ncdqbq4zs0777nbr717swm";
buildDepends = [
acid-state aeson attoparsec base cereal clientsession directory
errors filepath hashable lens MonadCatchIO-transformers mtl
- safecopy snap snap-core text time unordered-containers vector
+ safecopy scientific snap snap-core text time unordered-containers
+ vector
];
jailbreak = true;
description = "Provides an Acid-State backend for the Auth Snaplet";
@@ -114356,8 +115413,8 @@ self: {
}:
mkDerivation {
pname = "snaplet-sass";
- version = "0.1.0.0";
- sha256 = "0wv9a7pa6r7nzgppbywasqy38zk79ann2ivwyyh2b9dny95mx5yd";
+ version = "0.1.1.0";
+ sha256 = "05vif2rz0dj2b3vm0yh0bwj234xjnjpiaf2fk8vlv00jirgrdr40";
buildDepends = [
base bytestring configurator directory filepath mtl process snap
snap-core transformers
@@ -114387,18 +115444,17 @@ self: {
}) {};
"snaplet-ses-html" = callPackage
- ({ mkDerivation, base, blaze-html, bytestring, configurator
- , ses-html, snap, text, transformers
+ ({ mkDerivation, adjunctions, base, blaze-html, bytestring
+ , configurator, lens, ses-html, snap, text, transformers
}:
mkDerivation {
pname = "snaplet-ses-html";
- version = "0.1.0.0";
- sha256 = "14q577mnyf9r113v4sbfcpqlfd47wcdnbwvz70w5bqp996627jyl";
+ version = "0.1.1.0";
+ sha256 = "1s5pyhwdnpw1ijy67h4kw052jz4pp73bpjcqii31passybvfd7k6";
buildDepends = [
- base blaze-html bytestring configurator ses-html snap text
- transformers
+ adjunctions base blaze-html bytestring configurator lens ses-html
+ snap text transformers
];
- jailbreak = true;
description = "Snaplet for the ses-html package";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -114414,10 +115470,10 @@ self: {
}:
mkDerivation {
pname = "snaplet-sqlite-simple";
- version = "0.4.8.2";
- sha256 = "00a92wymniaw0si4xpkx1442prmcjimwrjjqiqnkj6k8bxs7p2jm";
+ version = "0.4.8.3";
+ sha256 = "0nc0kv9s3c4wc3xb6jggx9v4p141c3af07x8vda18c7qlfif5nx3";
buildDepends = [
- aeson base bytestring clientsession configurator direct-sqlite
+ aeson base bytestring clientsession configurator direct-sqlite lens
MonadCatchIO-transformers mtl snap sqlite-simple text transformers
unordered-containers
];
@@ -114427,7 +115483,6 @@ self: {
SafeSemaphore snap snap-core sqlite-simple stm test-framework
test-framework-hunit text time transformers unordered-containers
];
- jailbreak = true;
homepage = "https://github.com/nurpax/snaplet-sqlite-simple";
description = "sqlite-simple snaplet for the Snap Framework";
license = stdenv.lib.licenses.bsd3;
@@ -114638,8 +115693,8 @@ self: {
}:
mkDerivation {
pname = "snmp";
- version = "0.1.0.3";
- sha256 = "1zncgn3i6xbvxrwdf6s6vhbmsf6sqncf2rbllx26dz1bmxh4gr33";
+ version = "0.2.0.0";
+ sha256 = "0vjbpjsa4ivsjzvfc9sr457pms2rw1zpb92d971n0yccl0bxmf67";
buildDepends = [
asn1-encoding asn1-parse asn1-types async base binary bytestring
cipher-aes cipher-des containers crypto-cipher-types cryptohash mtl
@@ -114807,13 +115862,14 @@ self: {
({ mkDerivation, async, base, bytestring }:
mkDerivation {
pname = "socket";
- version = "0.2.0.0";
- sha256 = "0z9hcbvsalmn7zmmks18v8pq3gnvf868kw44a9s6kp5h6npp05dw";
+ version = "0.3.0.1";
+ sha256 = "01fz3lng41i9q4r2wh6nsyx27yc7jbhglzb10lg06d2ll7gxakx0";
buildDepends = [ base bytestring ];
testDepends = [ async base bytestring ];
homepage = "https://github.com/lpeterse/haskell-socket";
- description = "A binding to the POSIX sockets interface";
+ description = "A portable and extensible sockets library";
license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"socket-activation" = callPackage
@@ -115359,6 +116415,19 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "spdx" = callPackage
+ ({ mkDerivation, base, tasty, tasty-quickcheck, transformers }:
+ mkDerivation {
+ pname = "spdx";
+ version = "0.0.1.0";
+ sha256 = "0k4lpny0fl6yz92m3040dmsqjcyb5gslf0306hlsqbsbn1gzjjmm";
+ buildDepends = [ base transformers ];
+ testDepends = [ base tasty tasty-quickcheck ];
+ homepage = "https://github.com/phadej/spdx";
+ description = "SPDX license expression language";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"spe" = callPackage
({ mkDerivation, base }:
mkDerivation {
@@ -115436,8 +116505,8 @@ self: {
}:
mkDerivation {
pname = "species";
- version = "0.3.2.4";
- sha256 = "1ka5pd876iddaah9ay2ihcifhfh0f5rd19bn6yh42wlx6mdarfbq";
+ version = "0.3.3";
+ sha256 = "0cy6l4gvzydl9k2ijxkxhr6jqjbf85z71v6zrvbdajc3xip99w6i";
buildDepends = [
base containers multiset-comb np-extras numeric-prelude
template-haskell
@@ -116379,16 +117448,50 @@ self: {
}) {};
"stack" = callPackage
- ({ mkDerivation, base }:
+ ({ mkDerivation, aeson, async, attoparsec, base, base16-bytestring
+ , base64-bytestring, bifunctors, binary, bytestring, Cabal, conduit
+ , conduit-combinators, conduit-extra, containers, cryptohash
+ , cryptohash-conduit, deepseq, directory, either
+ , enclosed-exceptions, exceptions, fast-logger, filepath, hashable
+ , hspec, http-client, http-client-tls, http-conduit, http-types
+ , lifted-base, monad-control, monad-logger, monad-loops, mtl
+ , old-locale, optparse-applicative, optparse-simple, path
+ , persistent, persistent-sqlite, persistent-template, pretty
+ , process, resourcet, safe, split, stm, streaming-commons, tar
+ , template-haskell, temporary, text, time, transformers
+ , transformers-base, unix, unordered-containers, vector
+ , vector-binary-instances, void, yaml, zlib
+ }:
mkDerivation {
pname = "stack";
- version = "0.0.0";
- sha256 = "0829d2yb32gfnn22idhwzpyc2gy3d7lyj19kh20fbq73fp7k9kmb";
- isLibrary = false;
+ version = "0.0.2.1";
+ sha256 = "1gv2cbjnr93s4cyhybpd8nsqa8gqd9hpm9wyrh19fl82p8db46x6";
+ isLibrary = true;
isExecutable = true;
- buildDepends = [ base ];
+ buildDepends = [
+ aeson async attoparsec base base16-bytestring base64-bytestring
+ bifunctors binary bytestring Cabal conduit conduit-combinators
+ conduit-extra containers cryptohash cryptohash-conduit deepseq
+ directory either enclosed-exceptions exceptions fast-logger
+ filepath hashable http-client http-client-tls http-conduit
+ http-types lifted-base monad-control monad-logger monad-loops mtl
+ old-locale optparse-applicative optparse-simple path persistent
+ persistent-sqlite persistent-template pretty process resourcet safe
+ split stm streaming-commons tar template-haskell temporary text
+ time transformers transformers-base unix unordered-containers
+ vector vector-binary-instances void yaml zlib
+ ];
+ testDepends = [
+ base Cabal conduit conduit-extra containers cryptohash directory
+ exceptions filepath hspec http-conduit monad-logger path resourcet
+ temporary transformers
+ ];
+ homepage = "https://github.com/commercialhaskell/stack
+test/package-dump/ghc-7.8.txt
+test/package-dump/ghc-7.10.txt";
description = "The Haskell Tool Stack";
- license = stdenv.lib.licenses.mit;
+ license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"stack-prism" = callPackage
@@ -117990,8 +119093,8 @@ self: {
({ mkDerivation, base, bytestring, text, utf8-string }:
mkDerivation {
pname = "string-conversions";
- version = "0.3.0.3";
- sha256 = "0n2ifim9n5vm305r989lh5xlbd8qc6byip2nfavf6gd2bcscs84p";
+ version = "0.4";
+ sha256 = "1bi4mjnz0srb01n0k73asizp5h2ir7j3whxai9wprqvz7kdscr0s";
buildDepends = [ base bytestring text utf8-string ];
description = "Simplifies dealing with different types for strings";
license = stdenv.lib.licenses.bsd3;
@@ -118189,14 +119292,13 @@ self: {
}:
mkDerivation {
pname = "strive";
- version = "1.0.1";
- sha256 = "0c9zwgsy1s64c2kl1agirm8616rjpp2z9r73ch0ixrf200l6rw0d";
+ version = "2.1.0";
+ sha256 = "08jirx24wnfpknlgkcz605sn9nwb0g5hv75vgrms5gbq65gkg9s2";
buildDepends = [
aeson base bytestring data-default gpolyline http-conduit
http-types template-haskell text time transformers
];
testDepends = [ base bytestring hlint markdown-unlit time ];
- jailbreak = true;
homepage = "http://taylor.fausak.me/strive/";
description = "A Haskell client for the Strava V3 API";
license = stdenv.lib.licenses.mit;
@@ -118221,8 +119323,8 @@ self: {
}:
mkDerivation {
pname = "structural-induction";
- version = "0.2";
- sha256 = "1lr91wc1m655pi3ljw3n89svfazrb16785s9mfx361jgn335m8rd";
+ version = "0.2.0.1";
+ sha256 = "0ac5yhx6cbxzcdqy74lp791xwgammsnd8jazx0xy3ngxn4wwf23r";
buildDepends = [ base containers genifunctors mtl pretty safe ];
testDepends = [
base geniplate language-haskell-extract mtl pretty QuickCheck safe
@@ -118358,8 +119460,8 @@ self: {
}:
mkDerivation {
pname = "stylish-haskell";
- version = "0.5.13.0";
- sha256 = "1284x4g6k24v3k2ii5jfyly6b788477qih3lq81x72x22d36d168";
+ version = "0.5.14.0";
+ sha256 = "1z8fya123cldakf15fc4p9vp0gp9gxql4x7faz12gfp9d6ffj4f5";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -119996,17 +121098,14 @@ self: {
}) {};
"tagged-exception-core" = callPackage
- ({ mkDerivation, base, exceptions, extensible-exceptions, mmorph
- , transformers
- }:
+ ({ mkDerivation, base, exceptions, mmorph, mtl, transformers }:
mkDerivation {
pname = "tagged-exception-core";
- version = "2.0.0.0";
- sha256 = "02ny4yz9afaazw2pxpkpalffx8i5nhi3x9561blrd0pdrqq8qnib";
- buildDepends = [
- base exceptions extensible-exceptions mmorph transformers
- ];
- jailbreak = true;
+ version = "2.1.0.0";
+ revision = "1";
+ sha256 = "1w4020qb6f5vnym13a4jrha62vj7rqz3nfsrsxa34dl04y63jcax";
+ editedCabalFile = "8f3f0eba857169c03927f8605ed326b7a4a5395582aeac4edcee44369b4c9689";
+ buildDepends = [ base exceptions mmorph mtl transformers ];
homepage = "https://github.com/trskop/tagged-exception";
description = "Reflect exceptions using phantom types";
license = stdenv.lib.licenses.bsd3;
@@ -122626,14 +123725,14 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
- "th-orphans_0_12_0" = callPackage
+ "th-orphans_0_12_1" = callPackage
({ mkDerivation, base, hspec, mtl, nats, template-haskell, th-lift
, th-reify-many
}:
mkDerivation {
pname = "th-orphans";
- version = "0.12.0";
- sha256 = "0dgbk8w81k8d5a9y4nq7h2rz6rvz3vhc0bs0vff7c0iiaglgajvp";
+ version = "0.12.1";
+ sha256 = "11vndilqcx9scbb988xzpaj823g65a7b7vx6jzf9r3nb808kyb2j";
buildDepends = [
base mtl nats template-haskell th-lift th-reify-many
];
@@ -123106,8 +124205,8 @@ self: {
}:
mkDerivation {
pname = "thumbnail-plus";
- version = "1.0.4";
- sha256 = "110vfk5ri394awzmmq82r87gc9pmvy3500i836602syvd5zfa92x";
+ version = "1.0.5";
+ sha256 = "0320yfgnsazl7bxm9zf077mi4dgfmlcfnzy1qpdl9w3jl5i7z441";
buildDepends = [
base bytestring conduit conduit-extra data-default directory either
gd imagesize-conduit resourcet temporary transformers
@@ -123215,8 +124314,8 @@ self: {
}:
mkDerivation {
pname = "tidal";
- version = "0.4.32";
- sha256 = "1vb3ziin58gxf8jpjgv1c04bqa0vhkmib4h3v2s1k66gdkj1sxk2";
+ version = "0.4.33";
+ sha256 = "0xx02wbclq6hh50gz6vj3wmq7d5y7l4d6h48yxg3nwv4kwf44gf6";
buildDepends = [
base binary bytestring colour containers hashable hmt hosc
mersenne-random-pure64 mtl parsec process text time transformers
@@ -123528,13 +124627,14 @@ self: {
mkDerivation {
pname = "time-recurrence";
version = "0.9.2";
+ revision = "1";
sha256 = "1arqmkagmswimbh78qfz5bcilk9i14w29j4vf4i89d00vac3vrzm";
+ editedCabalFile = "7f1fe44ec61160e3fba86a04942d056ac91faa0002817e107e3d8399b71fe427";
buildDepends = [ base data-ordlist mtl time ];
testDepends = [
base data-ordlist HUnit mtl old-locale test-framework
test-framework-hunit time
];
- jailbreak = true;
homepage = "http://github.com/hellertime/time-recurrence";
description = "Generate recurring dates";
license = stdenv.lib.licenses.gpl3;
@@ -123726,6 +124826,7 @@ self: {
];
description = "Parse and display time according to some RFCs (RFC3339, RFC2822, RFC822)";
license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"timers" = callPackage
@@ -123894,6 +124995,46 @@ self: {
license = stdenv.lib.licenses.mit;
}) {};
+ "tip-haskell-frontend" = callPackage
+ ({ mkDerivation, base, bytestring, containers, directory, filepath
+ , geniplate-mirror, ghc, ghc-paths, mtl, pretty, pretty-show
+ , QuickCheck, split, tip-lib
+ }:
+ mkDerivation {
+ pname = "tip-haskell-frontend";
+ version = "0.1.1";
+ sha256 = "0za8ls980f98qj3k6pgmzaidmnrlk0nzg1r7skif6jmhh1snqc5h";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [
+ base bytestring containers directory filepath geniplate-mirror ghc
+ ghc-paths mtl pretty pretty-show QuickCheck split tip-lib
+ ];
+ homepage = "http://tip-org.github.io";
+ description = "Convert from Haskell to Tip";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
+ "tip-lib" = callPackage
+ ({ mkDerivation, alex, array, base, containers, geniplate-mirror
+ , happy, mtl, optparse-applicative, pretty, pretty-show, split
+ }:
+ mkDerivation {
+ pname = "tip-lib";
+ version = "0.1.2";
+ sha256 = "01x8hpijgx3fd0svp0di02470xnhq1gaa6k2fxjph9g5rzmx076b";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [
+ array base containers geniplate-mirror mtl optparse-applicative
+ pretty pretty-show split
+ ];
+ buildTools = [ alex happy ];
+ homepage = "http://tip-org.github.io";
+ description = "tons of inductive problems - support library and tools";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"titlecase" = callPackage
({ mkDerivation, base, blaze-markup, semigroups, tasty, tasty-hunit
, tasty-quickcheck, text
@@ -125025,6 +126166,27 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "trurl" = callPackage
+ ({ mkDerivation, aeson, base, bytestring, directory, filemanip
+ , hastache, http-conduit, MissingH, scientific, tar, tasty
+ , tasty-hunit, text, unordered-containers
+ }:
+ mkDerivation {
+ pname = "trurl";
+ version = "0.2.2.0";
+ sha256 = "139c97c63fhgq9lisic5wyfn872j120xsj3i72fs5s0aa9m59w81";
+ isLibrary = true;
+ isExecutable = true;
+ buildDepends = [
+ aeson base bytestring directory filemanip hastache http-conduit
+ MissingH scientific tar text unordered-containers
+ ];
+ testDepends = [ base hastache tasty tasty-hunit ];
+ homepage = "http://github.com/dbushenko/trurl";
+ description = "Haskell template code generator";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"tsession" = callPackage
({ mkDerivation, base, containers, mtl, time, transformers }:
mkDerivation {
@@ -125168,12 +126330,12 @@ self: {
}) {};
"tubes" = callPackage
- ({ mkDerivation, base, free, mtl, transformers }:
+ ({ mkDerivation, base, comonad, free, mtl, transformers }:
mkDerivation {
pname = "tubes";
- version = "0.1.0.0";
- sha256 = "0xfpvffwp9nqkgc0j6qx6fkliaynhr8zvwzgg02y791hkjbn629k";
- buildDepends = [ base free mtl transformers ];
+ version = "0.2.1.0";
+ sha256 = "1j1pzsmr4djjvhmix6ffsapm30lv4iim1jvcq454r1kxi0yid76z";
+ buildDepends = [ base comonad free mtl transformers ];
homepage = "https://github.com/gatlin/tubes";
description = "Effectful, iteratee-inspired stream processing based on a free monad";
license = stdenv.lib.licenses.gpl3;
@@ -125343,8 +126505,8 @@ self: {
}:
mkDerivation {
pname = "turtle";
- version = "1.1.0";
- sha256 = "0qpw366hyvprgcmxr83in2ay07f7br7bff2zqw9pnm7lkmkxrlkw";
+ version = "1.1.1";
+ sha256 = "1dgzzsylbri2p8wyf1xfww8la9vccb7yac0b0g2lf0b1ix4gphym";
buildDepends = [
async base clock directory foldl managed process system-fileio
system-filepath temporary text time transformers unix
@@ -126679,7 +127841,9 @@ self: {
mkDerivation {
pname = "uhc-light";
version = "1.1.9.0";
+ revision = "1";
sha256 = "0dqb0054nbl5qfxrg7g4yvmiawp9ladlws26cdf32jxrm31wgmkj";
+ editedCabalFile = "8847b4a41a2f6c9be09cf7b4835f53219522da9ef0ca26b918159fec747bd938";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -126699,8 +127863,8 @@ self: {
}:
mkDerivation {
pname = "uhc-util";
- version = "0.1.5.5";
- sha256 = "00b1ycdnm0gm01izs96qwsx3c3p1mrcimzamscaimyr1y14jvfc1";
+ version = "0.1.5.6";
+ sha256 = "1axg2apkvg3xk1cq78shbnc68i0h6fqcpjg8z3l4nc49kl5dywwz";
buildDepends = [
array base binary bytestring containers directory fclabels fgl
hashable ListLike mtl process syb time time-compat uulib
@@ -127035,8 +128199,8 @@ self: {
}:
mkDerivation {
pname = "uni-uDrawGraph";
- version = "2.2.0.3";
- sha256 = "0sh504l3xi9xlmwb28wzsana6c9ahmbdhx05s55w2ffwzbz0ca8a";
+ version = "2.2.1.3";
+ sha256 = "1gblb969s9al67srxf7rd9dajy6hji91aw5zaxxhaj0vgqsdb90j";
buildDepends = [
base containers uni-events uni-graphs uni-posixutil uni-reactor
uni-util
@@ -127932,14 +129096,13 @@ self: {
}:
mkDerivation {
pname = "uri-bytestring";
- version = "0.1.2";
- sha256 = "1rd166dsc5cl6bwvd43z08d6j6djnmskg1ddnv1js0z4xxpbs2qf";
+ version = "0.1.5";
+ sha256 = "0pl00n40b1nc3rnvayk8jz9lgv0s1lp33czyg962jdbffwhqgszj";
buildDepends = [ attoparsec base blaze-builder bytestring ];
testDepends = [
- attoparsec base bytestring derive HUnit lens QuickCheck
- quickcheck-instances tasty tasty-hunit tasty-quickcheck
+ attoparsec base blaze-builder bytestring derive HUnit lens
+ QuickCheck quickcheck-instances tasty tasty-hunit tasty-quickcheck
];
- jailbreak = true;
homepage = "https://github.com/Soostone/uri-bytestring";
description = "Haskell URI parsing as ByteStrings";
license = stdenv.lib.licenses.bsd3;
@@ -129115,8 +130278,8 @@ self: {
}:
mkDerivation {
pname = "vcache";
- version = "0.2.5";
- sha256 = "0jinysgn4rzh0b4a97wjac6md74vafb7avzprr6yddksmkylkayl";
+ version = "0.2.6";
+ sha256 = "08vg106dhzam5h0a6pzz4cbyzfg6pfgcgvn6xm1266kj1ipla18d";
buildDepends = [
base bytestring containers direct-murmur-hash easy-file filelock
lmdb random stm transformers
@@ -130282,20 +131445,26 @@ self: {
"wai-cors" = callPackage
({ mkDerivation, attoparsec, base, base-unicode-symbols, bytestring
- , case-insensitive, charset, http-types, mtl, parsers, transformers
- , wai
+ , case-insensitive, charset, directory, filepath, http-types, mtl
+ , network, parsers, process, text, transformers, wai
+ , wai-websockets, warp, websockets
}:
mkDerivation {
pname = "wai-cors";
- version = "0.2.2";
- sha256 = "174ld61b2hl890m591qfwclnb1jdssi9minksvhp34dmawnfwgvc";
+ version = "0.2.3";
+ sha256 = "1mnybcf50d0ijbg2a40kf4sl55rb1m4p02nqqid4g7vcanmfjw92";
buildDepends = [
attoparsec base base-unicode-symbols bytestring case-insensitive
charset http-types mtl parsers transformers wai
];
- homepage = "https://github.com/alephcloud/wai-cors";
+ testDepends = [
+ base base-unicode-symbols directory filepath http-types network
+ process text wai wai-websockets warp websockets
+ ];
+ homepage = "https://github.com/larskuhtz/wai-cors";
description = "CORS for WAI";
license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"wai-digestive-functors" = callPackage
@@ -130576,8 +131745,8 @@ self: {
}:
mkDerivation {
pname = "wai-logger";
- version = "2.2.4";
- sha256 = "0l7jd3fczn1hp5d7bbhkk0qflw320sr2yw9gb10jvsv42rs1kdbv";
+ version = "2.2.4.1";
+ sha256 = "1s6svvy3ci4j1dj1jaw8hg628miwj8f5gpy9n8d8hpsaxav6nzgk";
buildDepends = [
auto-update base blaze-builder byteorder bytestring
case-insensitive easy-file fast-logger http-types network unix
@@ -130699,8 +131868,8 @@ self: {
}:
mkDerivation {
pname = "wai-middleware-crowd";
- version = "0.1.1.1";
- sha256 = "1lkdjfp7aq61hzh9y13bqk9qgfr6s3m7n13ar73gjv5k2g97fizj";
+ version = "0.1.1.2";
+ sha256 = "039vqcy16ww7cigzppl0lnmjwbvxdv0z0zq3rnklh334lyh5jfay";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -130734,6 +131903,22 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "wai-middleware-gunzip" = callPackage
+ ({ mkDerivation, base, bytestring, http-types, streaming-commons
+ , wai
+ }:
+ mkDerivation {
+ pname = "wai-middleware-gunzip";
+ version = "0.0.2";
+ sha256 = "0rbvpw4y4qr2mhijlybzwwd12mkhrwmxlrhj2q0mq9diwhp597dx";
+ buildDepends = [
+ base bytestring http-types streaming-commons wai
+ ];
+ homepage = "https://github.com/twittner/wai-middleware-gunzip";
+ description = "WAI middleware to unzip request bodies";
+ license = stdenv.lib.licenses.mpl20;
+ }) {};
+
"wai-middleware-headers" = callPackage
({ mkDerivation, base, bytestring, http-types, wai }:
mkDerivation {
@@ -130792,6 +131977,26 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "wai-middleware-metrics" = callPackage
+ ({ mkDerivation, base, bytestring, ekg-core, http-types, QuickCheck
+ , scotty, tasty, tasty-hunit, tasty-quickcheck, time, transformers
+ , wai, wai-extra
+ }:
+ mkDerivation {
+ pname = "wai-middleware-metrics";
+ version = "0.2.1";
+ sha256 = "0aiig72r72vykd1f1871458d4glnqsrs7rr402jv5ka05d1rg6y0";
+ buildDepends = [ base ekg-core http-types time wai ];
+ testDepends = [
+ base bytestring ekg-core http-types QuickCheck scotty tasty
+ tasty-hunit tasty-quickcheck time transformers wai wai-extra
+ ];
+ jailbreak = true;
+ homepage = "https://github.com/Helkafen/wai-middleware-metrics";
+ description = "A WAI middleware to collect EKG request metrics";
+ license = stdenv.lib.licenses.bsd3;
+ }) {};
+
"wai-middleware-preprocessor" = callPackage
({ mkDerivation, base, Cabal, directory, mtl, split, text, wai
, wai-middleware-static, warp
@@ -130987,8 +132192,8 @@ self: {
}:
mkDerivation {
pname = "wai-routes";
- version = "0.6.1";
- sha256 = "15j37h3a56fsgmznmw8b1ksp0pkrrqz3kyrwj69hba2bnjcq5n7q";
+ version = "0.7.0";
+ sha256 = "1adiijvnwgm7j3qdr5ngxcc59amzcphgww3drj308hq278fpac08";
buildDepends = [
aeson base blaze-builder bytestring containers http-types mtl
path-pieces random template-haskell text wai
@@ -131298,8 +132503,8 @@ self: {
}:
mkDerivation {
pname = "warp-tls";
- version = "3.0.4";
- sha256 = "03k8iynz586cdjjh4nyrlbs8c864d305swrf4xkf55r9l3klsbg4";
+ version = "3.0.4.1";
+ sha256 = "0p9472j9sa584gw8i1jg89rhbl0kv6r1d6naiqfmmirxii4pmp4y";
buildDepends = [
base bytestring cprng-aes data-default-class network
streaming-commons tls wai warp
@@ -131577,8 +132782,8 @@ self: {
({ mkDerivation, base, containers, mtl, stm, text }:
mkDerivation {
pname = "web-plugins";
- version = "0.2.7";
- sha256 = "0pvwhr5mr960lramlnz7sffxrr7mxqskqk5pqbspck7cabzwzsxd";
+ version = "0.2.8";
+ sha256 = "00w0v0q2i0jxwlav1qb967nf35bxbr6vwacs5mqficzg2d4pz969";
buildDepends = [ base containers mtl stm text ];
homepage = "http://www.happstack.com/";
description = "dynamic plugin system for web applications";
@@ -131741,6 +132946,7 @@ self: {
base bytestring primitive text types-compat unordered-containers
];
testDepends = [ base doctest ];
+ jailbreak = true;
homepage = "https://github.com/philopon/web-routing";
description = "simple routing library";
license = stdenv.lib.licenses.mit;
@@ -131755,8 +132961,10 @@ self: {
}:
mkDerivation {
pname = "webcrank";
- version = "0.2.1";
- sha256 = "0px4dy4crivkga0h2ca9j6fxlzwyl8qm8xzd2xyllqm2gzvcc3l7";
+ version = "0.2.2";
+ revision = "1";
+ sha256 = "1rgvpp2526lmly2fli65mygplfc6wzqcw5fkn7gq4fcrmql2cisj";
+ editedCabalFile = "487831902c68484790108f97e32098dad9711eb15e0729b9ab1ba009e8fd5747";
buildDepends = [
attoparsec base blaze-builder bytestring case-insensitive either
exceptions http-date http-media http-types lens mtl semigroups text
@@ -131767,7 +132975,6 @@ self: {
http-media http-types lens mtl tasty tasty-hunit tasty-quickcheck
unordered-containers
];
- jailbreak = true;
homepage = "https://github.com/webcrank/webcrank.hs";
description = "Webmachine inspired toolkit for building http applications and services";
license = stdenv.lib.licenses.bsd3;
@@ -131796,8 +133003,8 @@ self: {
}:
mkDerivation {
pname = "webcrank-wai";
- version = "0.2";
- sha256 = "02d6hsgx70mcghz1xrszf1jnl62alki3ch7wacp35s8jz79xrccw";
+ version = "0.2.1";
+ sha256 = "13db2hpyvzpx9i43d8pryq7f87zlajpfpf0h6biva28l9qamy1yv";
buildDepends = [
base bytestring exceptions lens mtl unix-compat
unordered-containers wai wai-lens webcrank webcrank-dispatch
@@ -132508,13 +133715,12 @@ self: {
}:
mkDerivation {
pname = "wl-pprint-extras";
- version = "3.5.0.4";
- sha256 = "0mvg5vff574xvrdbdwnyy71kxv0cp0q5vv8fb12fbgydnvsy3mbl";
+ version = "3.5.0.5";
+ sha256 = "13wdx7l236yyv9wqsgcjlbrm5gk1bmw1z2lk4b21y699ly2imhm9";
buildDepends = [
base containers nats semigroupoids semigroups text utf8-string
];
testDepends = [ base HUnit test-framework test-framework-hunit ];
- jailbreak = true;
homepage = "http://github.com/ekmett/wl-pprint-extras/";
description = "A free monad based on the Wadler/Leijen pretty printer";
license = stdenv.lib.licenses.bsd3;
@@ -133042,8 +134248,8 @@ self: {
}:
mkDerivation {
pname = "wuss";
- version = "1.0.0";
- sha256 = "1nv8mkfbgfnlmni0rzlzq7ir27ya3lnhkksfbkywjkbwz2k3yykc";
+ version = "1.0.2";
+ sha256 = "0i4ln8pvjv1cgqcwid111azrls00g1jdhls3wrhnkw8wjcbiiqps";
buildDepends = [ base bytestring connection network websockets ];
testDepends = [ base doctest ];
homepage = "http://taylor.fausak.me/wuss/";
@@ -133424,8 +134630,8 @@ self: {
}:
mkDerivation {
pname = "xcffib";
- version = "0.3.0";
- sha256 = "1ih7wnsy38p7s14fnyg3pnm3hyp3nd6fprl2m66l09cj7ibvnxyc";
+ version = "0.3.2";
+ sha256 = "0njsflaxz2l01vbwndsmqmq37i6nl4cfczy776jdpnv7043b1ynv";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -133886,6 +135092,29 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "xml-conduit-parse" = callPackage
+ ({ mkDerivation, base, conduit, conduit-parse, containers
+ , data-default, exceptions, hlint, parsers, resourcet, tasty
+ , tasty-hunit, text, xml-conduit, xml-types
+ }:
+ mkDerivation {
+ pname = "xml-conduit-parse";
+ version = "0.2.0.1";
+ sha256 = "04cs7bfdyia56vp9khdszxap1ri2riymmhsdb8shkcypf4ndhyyw";
+ buildDepends = [
+ base conduit conduit-parse containers exceptions parsers text
+ xml-conduit xml-types
+ ];
+ testDepends = [
+ base conduit conduit-parse data-default hlint parsers resourcet
+ tasty tasty-hunit
+ ];
+ homepage = "https://github.com/k0ral/xml-conduit-parse";
+ description = "Streaming XML parser based on conduits";
+ license = "unknown";
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"xml-conduit-writer" = callPackage
({ mkDerivation, base, containers, dlist, mtl, text, xml-conduit
, xml-types
@@ -135036,6 +136265,7 @@ self: {
testDepends = [ base doctest ];
description = "Lens interface to yaml-light";
license = stdenv.lib.licenses.bsd3;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"yaml-rpc" = callPackage
@@ -135396,8 +136626,8 @@ self: {
}:
mkDerivation {
pname = "yesod-auth";
- version = "1.4.5";
- sha256 = "0agddsicjqcvraa3lcbxwwnk4mapjjd1y4pdp5kg111kaww6nkdn";
+ version = "1.4.5.1";
+ sha256 = "161gij0r82raih9lvdws4vsknpm36m00ikd17vhhlzz01q9z7l64";
buildDepends = [
aeson authenticate base base16-bytestring base64-bytestring binary
blaze-builder blaze-html blaze-markup byteable bytestring conduit
@@ -135430,6 +136660,7 @@ self: {
base bytestring hspec monad-logger mtl persistent-sqlite resourcet
text xml-conduit yesod yesod-auth yesod-test
];
+ jailbreak = true;
homepage = "https://bitbucket.org/wuzzeb/yesod-auth-account";
description = "An account authentication plugin for Yesod";
license = stdenv.lib.licenses.mit;
@@ -135455,6 +136686,7 @@ self: {
base bytestring hspec monad-logger mtl persistent-sqlite resourcet
text xml-conduit yesod yesod-auth yesod-auth-account yesod-test
];
+ jailbreak = true;
homepage = "https://github.com/meteficha/yesod-auth-account-fork";
description = "An account authentication plugin for Yesod";
license = stdenv.lib.licenses.mit;
@@ -135543,8 +136775,8 @@ self: {
}:
mkDerivation {
pname = "yesod-auth-hashdb";
- version = "1.4.2.1";
- sha256 = "1gc8049xvzrkqb91fpdrzr54byxag6rkqvb8650q4scpr09vzdpl";
+ version = "1.4.2.2";
+ sha256 = "0s2qmpn4iwzdpps7yqcwb63cp8v1za9fp4amg0qc6b0pllzr616r";
buildDepends = [
base bytestring cryptohash persistent pwstore-fast text yesod-auth
yesod-core yesod-form yesod-persistent
@@ -135699,8 +136931,8 @@ self: {
}:
mkDerivation {
pname = "yesod-bin";
- version = "1.4.9.2";
- sha256 = "0bbr9bjgj75jh8q9jzv9h1ivz87svz3j02hwphq32487f3682gd0";
+ version = "1.4.10";
+ sha256 = "1h55155l7ca664zdwq1x0c6p43gy35p1vvghpgd0ajzip8lsyfq1";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -135774,8 +137006,8 @@ self: {
}:
mkDerivation {
pname = "yesod-core";
- version = "1.4.9.1";
- sha256 = "1fqla2cahqr51jgr0l8pl2wq4rai2dq6yky75qjg5a4xrxcdq6sc";
+ version = "1.4.11";
+ sha256 = "1lfbpfv43vjxx8r1yf8py64sai14abwwq7395gs45vk059zi5hfs";
buildDepends = [
aeson auto-update base blaze-builder blaze-html blaze-markup
bytestring case-insensitive cereal clientsession conduit
@@ -135817,6 +137049,24 @@ self: {
license = stdenv.lib.licenses.bsd3;
}) {};
+ "yesod-crud-persist" = callPackage
+ ({ mkDerivation, base, lens, persistent, text, transformers, wai
+ , yesod-core, yesod-form, yesod-persistent
+ }:
+ mkDerivation {
+ pname = "yesod-crud-persist";
+ version = "0.1.0.0";
+ sha256 = "0kzigyggzxv4ps8a15bhk8ngxn15inp630x0v3kn0j1xdmj7inpw";
+ buildDepends = [
+ base lens persistent text transformers wai yesod-core yesod-form
+ yesod-persistent
+ ];
+ homepage = "google.com";
+ description = "Flexible CRUD subsite usable with Yesod and Persistent";
+ license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"yesod-datatables" = callPackage
({ mkDerivation, aeson, attoparsec, base, bytestring, data-default
, HUnit, monad-control, persistent, persistent-sqlite
@@ -135859,23 +137109,22 @@ self: {
}) {};
"yesod-dsl" = callPackage
- ({ mkDerivation, alex, array, base, Cabal, containers, directory
- , filepath, happy, MissingH, mtl, shakespeare, shakespeare-text
- , strict, syb, text, transformers, uniplate
+ ({ mkDerivation, aeson, aeson-pretty, alex, array, base, bytestring
+ , Cabal, containers, directory, filepath, happy, MissingH, mtl
+ , shakespeare, strict, syb, text, transformers, uniplate, vector
}:
mkDerivation {
pname = "yesod-dsl";
- version = "0.1.1.23";
- sha256 = "01rafa5klq1qjrl5w7ii4h27kiqhnacn95x7f2f7b1gxxp26psrx";
+ version = "0.1.1.24";
+ sha256 = "0pr5z3kg27j4fgyzs7ac263wd0qxfa3m45b6fn9hg18lwjb0fgd7";
isLibrary = true;
isExecutable = true;
buildDepends = [
- array base Cabal containers directory filepath MissingH mtl
- shakespeare shakespeare-text strict syb text transformers uniplate
+ aeson aeson-pretty array base bytestring Cabal containers directory
+ filepath MissingH mtl shakespeare strict syb text transformers
+ uniplate vector
];
buildTools = [ alex happy ];
- jailbreak = true;
- homepage = "https://github.com/tlaitinen/yesod-dsl";
description = "DSL for generating Yesod subsite to manage an RDBMS;";
license = stdenv.lib.licenses.bsd3;
hydraPlatforms = stdenv.lib.platforms.none;
@@ -136079,15 +137328,15 @@ self: {
, containers, country-codes, data-default, directory, fast-logger
, hamlet, hjsmin, http-conduit, http-types, lifted-base, mangopay
, monad-control, monad-logger, persistent, persistent-postgresql
- , persistent-template, resourcet, shakespeare, shakespeare-css
- , shakespeare-js, shakespeare-text, template-haskell, text, time
- , wai, wai-extra, wai-logger, warp, yaml, yesod, yesod-auth
- , yesod-core, yesod-form, yesod-persistent, yesod-static
+ , persistent-template, resourcet, shakespeare, template-haskell
+ , text, time, wai, wai-extra, wai-logger, warp, yaml, yesod
+ , yesod-auth, yesod-core, yesod-form, yesod-persistent
+ , yesod-static
}:
mkDerivation {
pname = "yesod-mangopay";
- version = "1.11";
- sha256 = "1j6dibg7l0g3hykwvhxm9n898gg06mrgyg89yjbv31pm4mfvycsn";
+ version = "1.11.1";
+ sha256 = "0haz7zd9s9c12fcz11wkhw50hni08g2an1f65bd6cj871zzz3mnl";
isLibrary = true;
isExecutable = true;
buildDepends = [
@@ -136095,8 +137344,7 @@ self: {
country-codes data-default directory fast-logger hamlet hjsmin
http-conduit http-types lifted-base mangopay monad-control
monad-logger persistent persistent-postgresql persistent-template
- resourcet shakespeare shakespeare-css shakespeare-js
- shakespeare-text template-haskell text time wai wai-extra
+ resourcet shakespeare template-haskell text time wai wai-extra
wai-logger warp yaml yesod yesod-auth yesod-core yesod-form
yesod-persistent yesod-static
];
@@ -136201,8 +137449,8 @@ self: {
}:
mkDerivation {
pname = "yesod-persistent";
- version = "1.4.0.2";
- sha256 = "06qzgq0mb7k0h8q6lh47l0mzx91xn4ba07nmn22vsfvjfdji6lib";
+ version = "1.4.0.3";
+ sha256 = "0prvrz52c2pr4qsanjzndviyq4f6zc49in69xz5153h2vagbfmb4";
buildDepends = [
base blaze-builder conduit persistent persistent-template
resource-pool resourcet transformers yesod-core
@@ -136565,6 +137813,21 @@ self: {
hydraPlatforms = stdenv.lib.platforms.none;
}) {};
+ "yesod-table" = callPackage
+ ({ mkDerivation, base, containers, contravariant, text, yesod-core
+ }:
+ mkDerivation {
+ pname = "yesod-table";
+ version = "0.1.1";
+ sha256 = "0glbdm19bf0pxp0y2831yi0yxjwc3b9xfhsdimxyc5ppm2dqdxsj";
+ buildDepends = [ base containers contravariant text yesod-core ];
+ jailbreak = true;
+ homepage = "https://github.com/andrewthad/yesod-table";
+ description = "HTML tables for Yesod";
+ license = stdenv.lib.licenses.mit;
+ hydraPlatforms = stdenv.lib.platforms.none;
+ }) {};
+
"yesod-tableview" = callPackage
({ mkDerivation, base, hamlet, persistent, yesod }:
mkDerivation {
@@ -136781,6 +138044,7 @@ self: {
homepage = "https://github.com/alephcloud/hs-yet-another-logger";
description = "Yet Another Logger";
license = stdenv.lib.licenses.asl20;
+ hydraPlatforms = stdenv.lib.platforms.none;
}) {};
"yhccore" = callPackage
@@ -137194,8 +138458,8 @@ self: {
}:
mkDerivation {
pname = "yst";
- version = "0.5.0.2";
- sha256 = "0spia0dma6ppqyns2g9ywd3pci87xzi1zkg03nxzbh8mxayq7js3";
+ version = "0.5.0.3";
+ sha256 = "15r381vsffqyzvgksipik0y9f41sy8ylsmvzw7hih4nrzp0w32ch";
isLibrary = false;
isExecutable = true;
buildDepends = [
@@ -137203,7 +138467,6 @@ self: {
HStringTemplate lucid old-locale old-time pandoc parsec scientific
split text time unordered-containers yaml
];
- jailbreak = true;
homepage = "http://github.com/jgm/yst";
description = "Builds a static website from templates and data in YAML or CSV files";
license = "GPL";
@@ -137596,10 +138859,11 @@ self: {
mkDerivation {
pname = "zippers";
version = "0.2";
+ revision = "1";
sha256 = "1rlf01dc6dcy9sx89npsisdz1yg9v4h2byd6ms602bxnmjllm1ls";
+ editedCabalFile = "3e27022f7ed27e35e73ed36f3aa6b396c7e7b52e864965b8d3cd4dab8394e960";
buildDepends = [ base lens profunctors semigroupoids ];
testDepends = [ base directory doctest filepath ];
- jailbreak = true;
homepage = "http://github.com/ekmett/zippers/";
description = "Traversal based zippers";
license = stdenv.lib.licenses.bsd3;
diff --git a/pkgs/development/haskell-modules/lib.nix b/pkgs/development/haskell-modules/lib.nix
index e601c7665ac..9b47b047bf6 100644
--- a/pkgs/development/haskell-modules/lib.nix
+++ b/pkgs/development/haskell-modules/lib.nix
@@ -77,4 +77,6 @@ rec {
buildStrictly = pkg: buildFromSdist (appendConfigureFlag pkg "--ghc-option=-Wall --ghc-option=-Werror");
+ triggerRebuild = drv: i: overrideCabal drv (drv: { postUnpack = ": trigger rebuild ${toString i}"; });
+
}
diff --git a/pkgs/development/haskell-modules/mueval-fix.patch b/pkgs/development/haskell-modules/mueval-fix.patch
new file mode 100644
index 00000000000..62a8f8f61e2
--- /dev/null
+++ b/pkgs/development/haskell-modules/mueval-fix.patch
@@ -0,0 +1,90 @@
+diff --git a/Mueval/ArgsParse.hs b/Mueval/ArgsParse.hs
+index 05c8fd9..0c32e27 100644
+--- a/Mueval/ArgsParse.hs
++++ b/Mueval/ArgsParse.hs
+@@ -1,10 +1,9 @@
++{-# LANGUAGE CPP #-}
+ module Mueval.ArgsParse (Options(..), interpreterOpts, getOptions) where
+
+ import Control.Monad (liftM)
+ import System.Console.GetOpt
+
+-import qualified Codec.Binary.UTF8.String as Codec (decodeString)
+-
+ import Mueval.Context (defaultModules, defaultPackages)
+
+ -- | See the results of --help for information on what each option means.
+@@ -98,4 +97,11 @@ header = "Usage: mueval [OPTION...] --expression EXPRESSION..."
+ -- | Just give us the end result options; this parsing for
+ -- us. Bonus points for handling UTF.
+ getOptions :: [String] -> Either (Bool, String) Options
+-getOptions = interpreterOpts . map Codec.decodeString
+\ No newline at end of file
++getOptions = interpreterOpts . map decodeString
++
++decodeString :: String -> String
++#if __GLASGOW_HASKELL__ >= 702
++decodeString = id
++#else
++decodeString = Codec.decodeString
++#endif
+diff --git a/Mueval/Context.hs b/Mueval/Context.hs
+index 78925cf..548514c 100644
+--- a/Mueval/Context.hs
++++ b/Mueval/Context.hs
+@@ -1,3 +1,4 @@
++{-# LANGUAGE CPP #-}
+ module Mueval.Context (
+ cleanModules,
+ defaultModules,
+@@ -32,7 +33,9 @@ defaultModules = ["Prelude",
+ "Control.Monad.Error",
+ "Control.Monad.Fix",
+ "Control.Monad.Identity",
++#if !MIN_VERSION_base(4,7,0)
+ "Control.Monad.Instances",
++#endif
+ "Control.Monad.RWS",
+ "Control.Monad.Reader",
+ "Control.Monad.State",
+diff --git a/Mueval/Interpreter.hs b/Mueval/Interpreter.hs
+index 29b771f..6c39482 100644
+--- a/Mueval/Interpreter.hs
++++ b/Mueval/Interpreter.hs
+@@ -1,4 +1,5 @@
+ {-# LANGUAGE PatternGuards #-}
++{-# LANGUAGE FlexibleContexts #-}
+ -- TODO: suggest the convenience functions be put into Hint proper?
+ module Mueval.Interpreter where
+
+@@ -12,8 +13,6 @@ import System.Exit (exitFailure)
+ import System.FilePath.Posix (takeFileName)
+ import qualified Control.Exception.Extensible as E (evaluate,catch,SomeException(..))
+
+-import qualified System.IO.UTF8 as UTF (putStrLn)
+-
+ import Language.Haskell.Interpreter (eval, set, reset, setImportsQ, loadModules, liftIO,
+ installedModulesInScope, languageExtensions,
+ typeOf, setTopLevelModules, runInterpreter, glasgowExtensions,
+@@ -100,7 +99,7 @@ mvload lfl = do canonfile <- makeRelativeToCurrentDirectory lfl
+ -- flooding. Lambdabot has a similar limit.
+ sayIO :: String -> IO ()
+ sayIO str = do (out,b) <- render 1024 str
+- UTF.putStrLn out
++ putStrLn out
+ when b exitFailure
+
+ -- | Oh no, something has gone wrong. If it's a compilation error pretty print
+diff --git a/mueval.cabal b/mueval.cabal
+index 3f9406d..b86d796 100644
+--- a/mueval.cabal
++++ b/mueval.cabal
+@@ -32,7 +32,7 @@ library
+ exposed-modules: Mueval.Parallel, Mueval.Context, Mueval.Interpreter,
+ Mueval.ArgsParse, Mueval.Resources
+ build-depends: base>=4 && < 5, containers, directory, mtl>2, filepath, unix, process,
+- hint>=0.3.1, show>=0.3, utf8-string, Cabal, extensible-exceptions, simple-reflect
++ hint>=0.3.1, show>=0.3, Cabal, extensible-exceptions, simple-reflect
+ ghc-options: -Wall -static
+
+ executable mueval-core
diff --git a/pkgs/development/interpreters/elixir/default.nix b/pkgs/development/interpreters/elixir/default.nix
index 9d12d42cee8..6bb8c0565d5 100644
--- a/pkgs/development/interpreters/elixir/default.nix
+++ b/pkgs/development/interpreters/elixir/default.nix
@@ -33,7 +33,7 @@ stdenv.mkDerivation {
if [ $b == "mix" ]; then continue; fi
wrapProgram $f \
--prefix PATH ":" "${erlang}/bin:${coreutils}/bin:${curl}/bin:${bash}/bin" \
- --set CURL_CA_BUNDLE "${cacert}/ca-bundle.crt"
+ --set CURL_CA_BUNDLE "${cacert}/etc/ssl/certs/ca-bundle.crt"
done
'';
diff --git a/pkgs/development/interpreters/gnu-apl/default.nix b/pkgs/development/interpreters/gnu-apl/default.nix
index 687b7319cf4..44462161407 100644
--- a/pkgs/development/interpreters/gnu-apl/default.nix
+++ b/pkgs/development/interpreters/gnu-apl/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, liblapack, readline, gettext, ncurses }:
+{ stdenv, fetchurl, readline, gettext, ncurses }:
stdenv.mkDerivation rec {
name = "gnu-apl-${version}";
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
sha256 = "0h4diq3wfbdwxp5nm0z4b0p1zq13lwip0y7v28r9v0mbbk8xsfh1";
};
- buildInputs = [ liblapack readline gettext ncurses ];
+ buildInputs = [ readline gettext ncurses ];
postInstall = ''
cp -r support-files/ $out/share/doc/
diff --git a/pkgs/development/interpreters/octave/default.nix b/pkgs/development/interpreters/octave/default.nix
index 9ad8c2790da..bdf6f775277 100644
--- a/pkgs/development/interpreters/octave/default.nix
+++ b/pkgs/development/interpreters/octave/default.nix
@@ -1,10 +1,22 @@
{ stdenv, fetchurl, gfortran, readline, ncurses, perl, flex, texinfo, qhull
-, libX11, graphicsmagick, pcre, liblapack, pkgconfig, mesa, fltk
-, fftw, fftwSinglePrec, zlib, curl, qrupdate
+, libX11, graphicsmagick, pcre, pkgconfig, mesa, fltk
+, fftw, fftwSinglePrec, zlib, curl, qrupdate, openblas
, qt ? null, qscintilla ? null, ghostscript ? null, llvm ? null, hdf5 ? null,glpk ? null
, suitesparse ? null, gnuplot ? null, jdk ? null, python ? null
}:
+let
+ suitesparseOrig = suitesparse;
+ qrupdateOrig = qrupdate;
+in
+# integer width is determined by openblas, so all dependencies must be built
+# with exactly the same openblas
+let
+ suitesparse =
+ if suitesparseOrig != null then suitesparseOrig.override { inherit openblas; } else null;
+ qrupdate = if qrupdateOrig != null then qrupdateOrig.override { inherit openblas; } else null;
+in
+
stdenv.mkDerivation rec {
version = "4.0.0";
name = "octave-${version}";
@@ -14,7 +26,7 @@ stdenv.mkDerivation rec {
};
buildInputs = [ gfortran readline ncurses perl flex texinfo qhull libX11
- graphicsmagick pcre liblapack pkgconfig mesa fltk zlib curl
+ graphicsmagick pcre pkgconfig mesa fltk zlib curl openblas
fftw fftwSinglePrec qrupdate ]
++ (stdenv.lib.optional (qt != null) qt)
++ (stdenv.lib.optional (qscintilla != null) qscintilla)
@@ -34,7 +46,13 @@ stdenv.mkDerivation rec {
# problems on Hydra
enableParallelBuilding = false;
- configureFlags = [ "--enable-readline" "--enable-dl" ];
+ configureFlags =
+ [ "--enable-readline"
+ "--enable-dl"
+ "--with-blas=openblas"
+ "--with-lapack=openblas"
+ ]
+ ++ stdenv.lib.optional openblas.blas64 "--enable-64";
# Keep a copy of the octave tests detailed results in the output
# derivation, because someone may care
diff --git a/pkgs/development/interpreters/php/5.4.nix b/pkgs/development/interpreters/php/5.4.nix
index c10425631b3..c1ba35a9134 100644
--- a/pkgs/development/interpreters/php/5.4.nix
+++ b/pkgs/development/interpreters/php/5.4.nix
@@ -1,6 +1,6 @@
{ callPackage, apacheHttpd }:
callPackage ./generic.nix {
- phpVersion = "5.4.41";
- sha = "0wl27f5z6vymajm2bzfp440zsp1jdxqn71avryiq1zw029db9i2v";
+ phpVersion = "5.4.42";
+ sha = "1yg03b6a88i7hg593m9zmmcm4kr59wdrhz9xk1frx9ps9gkb51b2";
apacheHttpd = apacheHttpd;
}
diff --git a/pkgs/development/interpreters/php/5.6.nix b/pkgs/development/interpreters/php/5.6.nix
index 425f51ce5c6..e05f1ae10bd 100644
--- a/pkgs/development/interpreters/php/5.6.nix
+++ b/pkgs/development/interpreters/php/5.6.nix
@@ -1,6 +1,6 @@
{ callPackage, apacheHttpd }:
callPackage ./generic.nix {
- phpVersion = "5.6.9";
- sha = "1fdwk8g509gxd5ad3y1s3j49hfkjdg8mgmzn9ki3pflbgdxvilqr";
+ phpVersion = "5.6.10";
+ sha = "0iccgibmbc659z6dh6c58l1b7vnqly7al37fbs0l3si4qy0rqmqa";
apacheHttpd = apacheHttpd;
}
diff --git a/pkgs/development/interpreters/pypy/default.nix b/pkgs/development/interpreters/pypy/default.nix
index c5abefc6a78..a453fd3e1a9 100644
--- a/pkgs/development/interpreters/pypy/default.nix
+++ b/pkgs/development/interpreters/pypy/default.nix
@@ -6,8 +6,8 @@ assert zlibSupport -> zlib != null;
let
- majorVersion = "2.5";
- version = "${majorVersion}.1";
+ majorVersion = "2.6";
+ version = "${majorVersion}.0";
libPrefix = "pypy${majorVersion}";
pypy = stdenv.mkDerivation rec {
@@ -18,7 +18,7 @@ let
src = fetchurl {
url = "https://bitbucket.org/pypy/pypy/get/release-${version}.tar.bz2";
- sha256 = "0gzhgc0rh5ywpkvzishpvkninl41r5k207y8afa8vxwpfx03vcrj";
+ sha256 = "0xympj874cnjpxj68xm5gllq2f8bbvz8hr0md8mh1yd6fgzzxibh";
};
buildInputs = [ bzip2 openssl pkgconfig pythonFull libffi ncurses expat sqlite tk tcl x11 libX11 makeWrapper ]
diff --git a/pkgs/development/interpreters/python/2.7/default.nix b/pkgs/development/interpreters/python/2.7/default.nix
index e67c2682998..4ad4679bd6e 100644
--- a/pkgs/development/interpreters/python/2.7/default.nix
+++ b/pkgs/development/interpreters/python/2.7/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, self, callPackage
-, bzip2, openssl
+, bzip2, openssl, gettext
, includeModules ? false
, db, gdbm, ncurses, sqlite, readline
-, tcl ? null, tk ? null, x11 ? null, libX11 ? null, x11Support ? true
+, tcl ? null, tk ? null, x11 ? null, libX11 ? null, x11Support ? !stdenv.isCygwin
, zlib ? null, zlibSupport ? true
, expat, libffi
}:
@@ -224,7 +224,7 @@ let
gdbm = buildInternalPythonModule {
moduleName = "gdbm";
internalName = "gdbm";
- deps = [ gdbm ];
+ deps = [ gdbm ] ++ stdenv.lib.optional stdenv.isCygwin gettext;
};
sqlite3 = buildInternalPythonModule {
diff --git a/pkgs/development/interpreters/ruby/bundler-head.nix b/pkgs/development/interpreters/ruby/bundler-head.nix
index 3e10a1e4b54..6edc01041f2 100644
--- a/pkgs/development/interpreters/ruby/bundler-head.nix
+++ b/pkgs/development/interpreters/ruby/bundler-head.nix
@@ -1,7 +1,7 @@
{ buildRubyGem, coreutils, fetchgit }:
buildRubyGem {
- name = "bundler-HEAD";
+ name = "bundler-2015-01-11";
src = fetchgit {
url = "https://github.com/bundler/bundler.git";
rev = "a2343c9eabf5403d8ffcbca4dea33d18a60fc157";
diff --git a/pkgs/development/libraries/apr-util/default.nix b/pkgs/development/libraries/apr-util/default.nix
index 0f21af94c64..bceb10e3355 100644
--- a/pkgs/development/libraries/apr-util/default.nix
+++ b/pkgs/development/libraries/apr-util/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, makeWrapper, apr, expat, gnused
, sslSupport ? true, openssl
, bdbSupport ? false, db
-, ldapSupport ? true, openldap
+, ldapSupport ? !stdenv.isCygwin, openldap
, libiconv
}:
@@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
configureFlags = ''
--with-apr=${apr} --with-expat=${expat}
- --with-crypto
+ ${if !stdenv.isCygwin then "--with-crypto" else "--without-pgsql --without-sqlite2 --without-sqlite3 --without-freetds --without-berkeley-db --without-crypto"}
${stdenv.lib.optionalString sslSupport "--with-openssl=${openssl}"}
${stdenv.lib.optionalString bdbSupport "--with-berkeley-db=${db}"}
${stdenv.lib.optionalString ldapSupport "--with-ldap"}
diff --git a/pkgs/development/libraries/boost/1.57.nix b/pkgs/development/libraries/boost/1.57.nix
index 6393c6e0d30..906f796b032 100644
--- a/pkgs/development/libraries/boost/1.57.nix
+++ b/pkgs/development/libraries/boost/1.57.nix
@@ -1,4 +1,4 @@
-{ callPackage, fetchurl, ... } @ args:
+{ stdenv, callPackage, fetchurl, ... } @ args:
callPackage ./generic.nix (args // rec {
version = "1.57.0";
@@ -7,4 +7,34 @@ callPackage ./generic.nix (args // rec {
url = "mirror://sourceforge/boost/boost_1_57_0.tar.bz2";
sha256 = "0rs94vdmg34bwwj23fllva6mhrml2i7mvmlb11zyrk1k5818q34i";
};
+
+ patches = if stdenv.isCygwin then [
+ ./cygwin-fedora-boost-1.50.0-fix-non-utf8-files.patch
+ ./cygwin-fedora-boost-1.50.0-pool.patch
+ ./cygwin-fedora-boost-1.57.0-mpl-print.patch
+ ./cygwin-fedora-boost-1.57.0-spirit-unused_typedef.patch
+ ./cygwin-fedora-boost-1.54.0-locale-unused_typedef.patch
+ ./cygwin-fedora-boost-1.54.0-python-unused_typedef.patch
+ ./cygwin-fedora-boost-1.57.0-pool-test_linking.patch
+ ./cygwin-fedora-boost-1.54.0-pool-max_chunks_shadow.patch
+ ./cygwin-fedora-boost-1.57.0-signals2-weak_ptr.patch
+ ./cygwin-fedora-boost-1.57.0-uuid-comparison.patch
+ ./cygwin-fedora-boost-1.57.0-move-is_class.patch
+ ./cygwin-1.40.0-cstdint-cygwin.patch
+ ./cygwin-1.57.0-asio-cygwin.patch
+ ./cygwin-1.55.0-asio-MSG_EOR.patch
+ ./cygwin-1.57.0-config-cygwin.patch
+ ./cygwin-1.57.0-context-cygwin.patch
+ ./cygwin-1.57.0-filesystem-cygwin.patch
+ ./cygwin-1.55.0-interlocked-cygwin.patch
+ ./cygwin-1.40.0-iostreams-cygwin.patch
+ ./cygwin-1.57.0-locale-cygwin.patch
+ ./cygwin-1.57.0-log-cygwin.patch
+ ./cygwin-1.40.0-python-cygwin.patch
+ ./cygwin-1.40.0-regex-cygwin.patch
+ ./cygwin-1.57.0-smart_ptr-cygwin.patch
+ ./cygwin-1.57.0-system-cygwin.patch
+ ./cygwin-1.45.0-jam-cygwin.patch
+ ./cygwin-1.50.0-jam-pep3149.patch
+ ] else null;
})
diff --git a/pkgs/development/libraries/boost/cygwin-1.40.0-cstdint-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.40.0-cstdint-cygwin.patch
new file mode 100644
index 00000000000..61791c60d9e
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.40.0-cstdint-cygwin.patch
@@ -0,0 +1,20 @@
+These were fixed in ~1.7.0-46
+
+--- boost_1_40_0/boost/cstdint.hpp 2009-01-14 04:18:19.000000000 -0600
++++ boost_1_40_0/boost/cstdint.hpp 2009-08-27 23:41:34.063543700 -0500
+@@ -40,15 +40,6 @@
+ # include
+ # else
+ # include
+-
+-// There is a bug in Cygwin two _C macros
+-# if defined(__STDC_CONSTANT_MACROS) && defined(__CYGWIN__)
+-# undef INTMAX_C
+-# undef UINTMAX_C
+-# define INTMAX_C(c) c##LL
+-# define UINTMAX_C(c) c##ULL
+-# endif
+-
+ # endif
+
+ #ifdef __QNX__
diff --git a/pkgs/development/libraries/boost/cygwin-1.40.0-iostreams-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.40.0-iostreams-cygwin.patch
new file mode 100644
index 00000000000..6641ba823b1
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.40.0-iostreams-cygwin.patch
@@ -0,0 +1,24 @@
+--- boost_1_40_0/boost/iostreams/detail/config/wide_streams.hpp 2008-03-22 16:45:55.000000000 -0500
++++ boost_1_40_0/boost/iostreams/detail/config/wide_streams.hpp 2009-08-27 23:41:34.082544800 -0500
+@@ -44,8 +44,7 @@
+ //------------------Locale support--------------------------------------------//
+
+ #ifndef BOOST_IOSTREAMS_NO_LOCALE
+-# if defined(BOOST_NO_STD_LOCALE) || \
+- defined(__CYGWIN__) && \
++# if defined(BOOST_NO_STD_LOCALE) && \
+ ( !defined(__MSL_CPP__) || defined(_MSL_NO_WCHART_CPP_SUPPORT) ) \
+ /**/
+ # define BOOST_IOSTREAMS_NO_LOCALE
+--- boost_1_40_0/boost/iostreams/detail/config/windows_posix.hpp 2008-03-22 16:45:55.000000000 -0500
++++ boost_1_40_0/boost/iostreams/detail/config/windows_posix.hpp 2009-08-27 23:41:34.087545100 -0500
+@@ -13,8 +13,7 @@
+
+ // BOOST_IOSTREAMS_POSIX or BOOST_IOSTREAMS_WINDOWS specify which API to use.
+ #if !defined( BOOST_IOSTREAMS_WINDOWS ) && !defined( BOOST_IOSTREAMS_POSIX )
+-# if (defined(_WIN32) || defined(__WIN32__) || defined(WIN32)) && \
+- !defined(__CYGWIN__) \
++# if (defined(_WIN32) || defined(__WIN32__) || defined(WIN32))
+ /**/
+ # define BOOST_IOSTREAMS_WINDOWS
+ # else
diff --git a/pkgs/development/libraries/boost/cygwin-1.40.0-python-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.40.0-python-cygwin.patch
new file mode 100644
index 00000000000..7932b0e124b
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.40.0-python-cygwin.patch
@@ -0,0 +1,35 @@
+--- boost_1_40_0/boost/python/detail/config.hpp 2007-11-25 12:07:19.000000000 -0600
++++ boost_1_40_0/boost/python/detail/config.hpp 2009-08-27 23:41:34.092545400 -0500
+@@ -83,7 +83,7 @@
+ # endif
+ # define BOOST_PYTHON_DECL_FORWARD
+ # define BOOST_PYTHON_DECL_EXCEPTION __attribute__ ((__visibility__("default")))
+-# elif (defined(_WIN32) || defined(__CYGWIN__))
++# elif defined(_WIN32)
+ # if defined(BOOST_PYTHON_SOURCE)
+ # define BOOST_PYTHON_DECL __declspec(dllexport)
+ # define BOOST_PYTHON_BUILD_DLL
+--- boost_1_40_0/boost/python/detail/wrap_python.hpp 2007-04-27 17:16:47.000000000 -0500
++++ boost_1_40_0/boost/python/detail/wrap_python.hpp 2009-08-27 23:41:34.096545600 -0500
+@@ -82,8 +82,8 @@
+ // Some things we need in order to get Python.h to work with compilers other
+ // than MSVC on Win32
+ //
+-#if defined(_WIN32) || defined(__CYGWIN__)
+-# if defined(__GNUC__) && defined(__CYGWIN__)
++#if defined(_WIN32)
++# if defined(__GNUC__)
+
+ # define SIZEOF_LONG 4
+
+--- boost_1_40_0/boost/python/module_init.hpp 2007-06-07 13:08:54.000000000 -0500
++++ boost_1_40_0/boost/python/module_init.hpp 2009-08-27 23:41:34.101545900 -0500
+@@ -15,7 +15,7 @@ BOOST_PYTHON_DECL void init_module(char
+
+ }}}
+
+-# if (defined(_WIN32) || defined(__CYGWIN__)) && !defined(BOOST_PYTHON_STATIC_MODULE)
++# if defined(_WIN32) && !defined(BOOST_PYTHON_STATIC_MODULE)
+
+ # define BOOST_PYTHON_MODULE_INIT(name) \
+ void init_module_##name(); \
diff --git a/pkgs/development/libraries/boost/cygwin-1.40.0-regex-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.40.0-regex-cygwin.patch
new file mode 100644
index 00000000000..969bb814bd1
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.40.0-regex-cygwin.patch
@@ -0,0 +1,15 @@
+--- boost_1_40_0/boost/regex/v4/fileiter.hpp 2007-11-25 12:07:19.000000000 -0600
++++ boost_1_40_0/boost/regex/v4/fileiter.hpp 2009-08-27 23:41:34.106546200 -0500
+@@ -28,11 +28,7 @@
+
+ #ifndef BOOST_REGEX_NO_FILEITER
+
+-#if (defined(__CYGWIN__) || defined(__CYGWIN32__)) && !defined(BOOST_REGEX_NO_W32)
+-#error "Sorry, can't mix with STL code and gcc compiler: if you ran configure, try again with configure --disable-ms-windows"
+-#define BOOST_REGEX_FI_WIN32_MAP
+-#define BOOST_REGEX_FI_POSIX_DIR
+-#elif (defined(__WIN32__) || defined(_WIN32) || defined(WIN32)) && !defined(BOOST_REGEX_NO_W32)
++#if (defined(__WIN32__) || defined(_WIN32) || defined(WIN32)) && !defined(BOOST_REGEX_NO_W32)
+ #define BOOST_REGEX_FI_WIN32_MAP
+ #define BOOST_REGEX_FI_WIN32_DIR
+ #else
diff --git a/pkgs/development/libraries/boost/cygwin-1.45.0-jam-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.45.0-jam-cygwin.patch
new file mode 100644
index 00000000000..1a00851fa92
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.45.0-jam-cygwin.patch
@@ -0,0 +1,12 @@
+OS_CYGWIN is used to assume cygpath, Win32-isms
+
+--- boost_1_48_0/tools/build/src/engine/jam.h
++++ boost_1_48_0/tools/build/src/engine/jam.h
+@@ -245,7 +245,6 @@
+ #endif
+ #if defined(__cygwin__) || defined(__CYGWIN__)
+ #define OSMINOR "OS=CYGWIN"
+- #define OS_CYGWIN
+ #endif
+ #if defined(__FreeBSD__) && !defined(__DragonFly__)
+ #define OSMINOR "OS=FREEBSD"
diff --git a/pkgs/development/libraries/boost/cygwin-1.50.0-jam-pep3149.patch b/pkgs/development/libraries/boost/cygwin-1.50.0-jam-pep3149.patch
new file mode 100644
index 00000000000..4bc6ec9d36e
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.50.0-jam-pep3149.patch
@@ -0,0 +1,11 @@
+--- a/tools/build/src/tools/python.jam 2012-04-25 22:35:55.000000000 -0500
++++ b/tools/build/src/tools/python.jam 2013-01-21 07:22:30.814373200 -0600
+@@ -376,7 +376,7 @@ local rule path-to-native ( paths * )
+ #
+ local rule split-version ( version )
+ {
+- local major-minor = [ MATCH ^([0-9]+)\.([0-9]+)(.*)$ : $(version) : 1 2 3 ] ;
++ local major-minor = [ MATCH ^([0-9]+)\.([0-9]+[dmu]*)(.*)$ : $(version) : 1 2 3 ] ;
+ if ! $(major-minor[2]) || $(major-minor[3])
+ {
+ ECHO "Warning: \"using python\" expects a two part (major, minor) version number; got" $(version) instead ;
diff --git a/pkgs/development/libraries/boost/cygwin-1.55.0-asio-MSG_EOR.patch b/pkgs/development/libraries/boost/cygwin-1.55.0-asio-MSG_EOR.patch
new file mode 100644
index 00000000000..46308a59cb0
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.55.0-asio-MSG_EOR.patch
@@ -0,0 +1,14 @@
+--- boost_1_55_0/boost/asio/detail/socket_types.hpp 2014-08-31 12:43:54.186255800 -0500
++++ boost_1_55_0/boost/asio/detail/socket_types.hpp 2014-08-31 12:43:03.887868700 -0500
+@@ -332,7 +332,11 @@ typedef int signed_size_type;
+ # define BOOST_ASIO_OS_DEF_MSG_OOB MSG_OOB
+ # define BOOST_ASIO_OS_DEF_MSG_PEEK MSG_PEEK
+ # define BOOST_ASIO_OS_DEF_MSG_DONTROUTE MSG_DONTROUTE
++#ifdef MSG_EOR
+ # define BOOST_ASIO_OS_DEF_MSG_EOR MSG_EOR
++#else
++# define BOOST_ASIO_OS_DEF_MSG_EOR 0
++#endif
+ # define BOOST_ASIO_OS_DEF_SHUT_RD SHUT_RD
+ # define BOOST_ASIO_OS_DEF_SHUT_WR SHUT_WR
+ # define BOOST_ASIO_OS_DEF_SHUT_RDWR SHUT_RDWR
diff --git a/pkgs/development/libraries/boost/cygwin-1.55.0-interlocked-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.55.0-interlocked-cygwin.patch
new file mode 100644
index 00000000000..df3edf51e7b
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.55.0-interlocked-cygwin.patch
@@ -0,0 +1,11 @@
+--- boost_1_55_0/boost/detail/interlocked.hpp 2013-10-24 09:01:53.000000000 -0500
++++ boost_1_55_0/boost/detail/interlocked.hpp 2014-08-31 13:01:33.830313500 -0500
+@@ -160,7 +160,7 @@ extern "C" void* __cdecl _InterlockedExc
+ ((void*)BOOST_INTERLOCKED_EXCHANGE((long volatile*)(dest),(long)(exchange)))
+ # endif
+
+-#elif defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ ) || defined( __CYGWIN__ )
++#elif defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ )
+
+ #define BOOST_INTERLOCKED_IMPORT __declspec(dllimport)
+
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-asio-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-asio-cygwin.patch
new file mode 100644
index 00000000000..3702d475c8e
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-asio-cygwin.patch
@@ -0,0 +1,1835 @@
+--- boost_1_57_0/boost/asio/detail/buffer_sequence_adapter.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/buffer_sequence_adapter.hpp 2015-05-04 17:33:18.798985800 -0500
+@@ -42,7 +42,7 @@ protected:
+ BOOST_ASIO_DECL static void init_native_buffer(
+ native_buffer_type& buf,
+ const boost::asio::const_buffer& buffer);
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ // The maximum number of buffers to support in a single operation.
+ enum { max_buffers = 64 < max_iov_len ? 64 : max_iov_len };
+
+@@ -61,7 +61,7 @@ protected:
+ buf.buf = const_cast(boost::asio::buffer_cast(buffer));
+ buf.len = static_cast(boost::asio::buffer_size(buffer));
+ }
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ // The maximum number of buffers to support in a single operation.
+ enum { max_buffers = 64 < max_iov_len ? 64 : max_iov_len };
+
+@@ -92,7 +92,7 @@ protected:
+ boost::asio::buffer_cast(buffer)));
+ iov.iov_len = boost::asio::buffer_size(buffer);
+ }
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ };
+
+ // Helper class to translate buffers into the native buffer representation.
+--- boost_1_57_0/boost/asio/detail/config.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/config.hpp 2015-05-04 17:34:30.756623300 -0500
+@@ -474,7 +474,7 @@
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+
+ // Windows: target OS version.
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # if !defined(_WIN32_WINNT) && !defined(_WIN32_WINDOWS)
+ # if defined(_MSC_VER) || defined(__BORLANDC__)
+ # pragma message( \
+@@ -512,29 +512,29 @@
+ # error You must add -D__USE_W32_SOCKETS to your compiler options.
+ # endif // !defined(__USE_W32_SOCKETS)
+ # endif // defined(__CYGWIN__)
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ // Windows: minimise header inclusion.
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # if !defined(BOOST_ASIO_NO_WIN32_LEAN_AND_MEAN)
+ # if !defined(WIN32_LEAN_AND_MEAN)
+ # define WIN32_LEAN_AND_MEAN
+ # endif // !defined(WIN32_LEAN_AND_MEAN)
+ # endif // !defined(BOOST_ASIO_NO_WIN32_LEAN_AND_MEAN)
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ // Windows: suppress definition of "min" and "max" macros.
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # if !defined(BOOST_ASIO_NO_NOMINMAX)
+ # if !defined(NOMINMAX)
+ # define NOMINMAX 1
+ # endif // !defined(NOMINMAX)
+ # endif // !defined(BOOST_ASIO_NO_NOMINMAX)
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ // Windows: IO Completion Ports.
+ #if !defined(BOOST_ASIO_HAS_IOCP)
+-# if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# if defined(BOOST_ASIO_WINDOWS)
+ # if defined(_WIN32_WINNT) && (_WIN32_WINNT >= 0x0400)
+ # if !defined(UNDER_CE)
+ # if !defined(BOOST_ASIO_DISABLE_IOCP)
+@@ -542,7 +542,7 @@
+ # endif // !defined(BOOST_ASIO_DISABLE_IOCP)
+ # endif // !defined(UNDER_CE)
+ # endif // defined(_WIN32_WINNT) && (_WIN32_WINNT >= 0x0400)
+-# endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# endif // defined(BOOST_ASIO_WINDOWS)
+ #endif // !defined(BOOST_ASIO_HAS_IOCP)
+
+ // Linux: epoll, eventfd and timerfd.
+@@ -599,8 +599,7 @@
+ #if !defined(BOOST_ASIO_HAS_SERIAL_PORT)
+ # if defined(BOOST_ASIO_HAS_IOCP) \
+ || !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ # if !defined(__SYMBIAN32__)
+ # if !defined(BOOST_ASIO_DISABLE_SERIAL_PORT)
+ # define BOOST_ASIO_HAS_SERIAL_PORT 1
+@@ -609,7 +608,6 @@
+ # endif // defined(BOOST_ASIO_HAS_IOCP)
+ // || !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ #endif // !defined(BOOST_ASIO_HAS_SERIAL_PORT)
+
+ // Windows: stream handles.
+@@ -633,11 +631,11 @@
+ // Windows: object handles.
+ #if !defined(BOOST_ASIO_HAS_WINDOWS_OBJECT_HANDLE)
+ # if !defined(BOOST_ASIO_DISABLE_WINDOWS_OBJECT_HANDLE)
+-# if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# if defined(BOOST_ASIO_WINDOWS)
+ # if !defined(UNDER_CE)
+ # define BOOST_ASIO_HAS_WINDOWS_OBJECT_HANDLE 1
+ # endif // !defined(UNDER_CE)
+-# endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# endif // defined(BOOST_ASIO_WINDOWS)
+ # endif // !defined(BOOST_ASIO_DISABLE_WINDOWS_OBJECT_HANDLE)
+ #endif // !defined(BOOST_ASIO_HAS_WINDOWS_OBJECT_HANDLE)
+
+@@ -654,12 +652,10 @@
+ #if !defined(BOOST_ASIO_HAS_POSIX_STREAM_DESCRIPTOR)
+ # if !defined(BOOST_ASIO_DISABLE_POSIX_STREAM_DESCRIPTOR)
+ # if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ # define BOOST_ASIO_HAS_POSIX_STREAM_DESCRIPTOR 1
+ # endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ # endif // !defined(BOOST_ASIO_DISABLE_POSIX_STREAM_DESCRIPTOR)
+ #endif // !defined(BOOST_ASIO_HAS_POSIX_STREAM_DESCRIPTOR)
+
+@@ -667,12 +663,10 @@
+ #if !defined(BOOST_ASIO_HAS_LOCAL_SOCKETS)
+ # if !defined(BOOST_ASIO_DISABLE_LOCAL_SOCKETS)
+ # if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ # define BOOST_ASIO_HAS_LOCAL_SOCKETS 1
+ # endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ # endif // !defined(BOOST_ASIO_DISABLE_LOCAL_SOCKETS)
+ #endif // !defined(BOOST_ASIO_HAS_LOCAL_SOCKETS)
+
+@@ -680,12 +674,10 @@
+ #if !defined(BOOST_ASIO_HAS_SIGACTION)
+ # if !defined(BOOST_ASIO_DISABLE_SIGACTION)
+ # if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ # define BOOST_ASIO_HAS_SIGACTION 1
+ # endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ # endif // !defined(BOOST_ASIO_DISABLE_SIGACTION)
+ #endif // !defined(BOOST_ASIO_HAS_SIGACTION)
+
+@@ -700,7 +692,7 @@
+
+ // Can use getaddrinfo() and getnameinfo().
+ #if !defined(BOOST_ASIO_HAS_GETADDRINFO)
+-# if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# if defined(BOOST_ASIO_WINDOWS)
+ # if defined(_WIN32_WINNT) && (_WIN32_WINNT >= 0x0501)
+ # define BOOST_ASIO_HAS_GETADDRINFO 1
+ # elif defined(UNDER_CE)
+--- boost_1_57_0/boost/asio/detail/descriptor_ops.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/descriptor_ops.hpp 2015-05-04 17:33:18.826989400 -0500
+@@ -18,8 +18,7 @@
+ #include
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #include
+ #include
+@@ -114,6 +113,5 @@ BOOST_ASIO_DECL int poll_write(int d,
+
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ #endif // BOOST_ASIO_DETAIL_DESCRIPTOR_OPS_HPP
+--- boost_1_57_0/boost/asio/detail/descriptor_read_op.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/descriptor_read_op.hpp 2015-05-04 17:33:18.830489800 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+@@ -116,6 +116,6 @@ private:
+
+ #include
+
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_DESCRIPTOR_READ_OP_HPP
+--- boost_1_57_0/boost/asio/detail/descriptor_write_op.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/descriptor_write_op.hpp 2015-05-04 17:33:18.833490200 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+@@ -116,6 +116,6 @@ private:
+
+ #include
+
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_DESCRIPTOR_WRITE_OP_HPP
+--- boost_1_57_0/boost/asio/detail/fd_set_adapter.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/fd_set_adapter.hpp 2015-05-04 17:33:18.836490600 -0500
+@@ -26,7 +26,7 @@ namespace boost {
+ namespace asio {
+ namespace detail {
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ typedef win_fd_set_adapter fd_set_adapter;
+ #else
+ typedef posix_fd_set_adapter fd_set_adapter;
+--- boost_1_57_0/boost/asio/detail/hash_map.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/hash_map.hpp 2015-05-04 17:33:18.839991000 -0500
+@@ -21,9 +21,9 @@
+ #include
+ #include
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # include
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #include
+
+@@ -42,12 +42,12 @@ inline std::size_t calculate_hash_value(
+ + (reinterpret_cast(p) >> 3);
+ }
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ inline std::size_t calculate_hash_value(SOCKET s)
+ {
+ return static_cast(s);
+ }
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ // Note: assumes K and V are POD types.
+ template
+--- boost_1_57_0/boost/asio/detail/impl/descriptor_ops.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/descriptor_ops.ipp 2015-05-04 17:33:18.843491500 -0500
+@@ -21,8 +21,7 @@
+ #include
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #include
+
+@@ -448,6 +447,5 @@ int poll_write(int d, state_type state,
+
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ #endif // BOOST_ASIO_DETAIL_IMPL_DESCRIPTOR_OPS_IPP
+--- boost_1_57_0/boost/asio/detail/impl/pipe_select_interrupter.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/pipe_select_interrupter.ipp 2015-05-04 17:33:18.846991900 -0500
+@@ -19,7 +19,6 @@
+
+ #if !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ #if !defined(BOOST_ASIO_WINDOWS)
+-#if !defined(__CYGWIN__)
+ #if !defined(__SYMBIAN32__)
+ #if !defined(BOOST_ASIO_HAS_EVENTFD)
+
+@@ -119,7 +118,6 @@ bool pipe_select_interrupter::reset()
+
+ #endif // !defined(BOOST_ASIO_HAS_EVENTFD)
+ #endif // !defined(__SYMBIAN32__)
+-#endif // !defined(__CYGWIN__)
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ #endif // !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+--- boost_1_57_0/boost/asio/detail/impl/reactive_descriptor_service.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/reactive_descriptor_service.ipp 2015-05-04 17:33:18.849992300 -0500
+@@ -18,8 +18,7 @@
+ #include
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #include
+ #include
+@@ -205,6 +204,5 @@ void reactive_descriptor_service::start_
+
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ #endif // BOOST_ASIO_DETAIL_IMPL_REACTIVE_DESCRIPTOR_SERVICE_IPP
+--- boost_1_57_0/boost/asio/detail/impl/reactive_serial_port_service.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/reactive_serial_port_service.ipp 2015-05-04 17:33:18.853492700 -0500
+@@ -19,7 +19,7 @@
+ #include
+
+ #if defined(BOOST_ASIO_HAS_SERIAL_PORT)
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+@@ -147,7 +147,7 @@ boost::system::error_code reactive_seria
+
+ #include
+
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+ #endif // defined(BOOST_ASIO_HAS_SERIAL_PORT)
+
+ #endif // BOOST_ASIO_DETAIL_IMPL_REACTIVE_SERIAL_PORT_SERVICE_IPP
+--- boost_1_57_0/boost/asio/detail/impl/select_reactor.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/select_reactor.ipp 2015-05-04 17:29:21.281324900 -0500
+@@ -187,7 +187,7 @@ void select_reactor::run(bool block, op_
+ max_fd = fd_sets_[i].max_descriptor();
+ }
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ // Connection operations on Windows use both except and write fd_sets.
+ have_work_to_do = have_work_to_do || !op_queue_[connect_op].empty();
+ fd_sets_[write_op].set(op_queue_[connect_op], ops);
+@@ -196,7 +196,7 @@ void select_reactor::run(bool block, op_
+ fd_sets_[except_op].set(op_queue_[connect_op], ops);
+ if (fd_sets_[except_op].max_descriptor() > max_fd)
+ max_fd = fd_sets_[except_op].max_descriptor();
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ // We can return immediately if there's no work to do and the reactor is
+ // not supposed to block.
+@@ -226,11 +226,11 @@ void select_reactor::run(bool block, op_
+ // Dispatch all ready operations.
+ if (retval > 0)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ // Connection operations on Windows use both except and write fd_sets.
+ fd_sets_[except_op].perform(op_queue_[connect_op], ops);
+ fd_sets_[write_op].perform(op_queue_[connect_op], ops);
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ // Exception operations must be processed first to ensure that any
+ // out-of-band data is read before normal data.
+--- boost_1_57_0/boost/asio/detail/impl/signal_set_service.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/signal_set_service.ipp 2015-05-04 17:33:18.857993300 -0500
+@@ -60,12 +60,10 @@ signal_state* get_signal_state()
+ void boost_asio_signal_handler(int signal_number)
+ {
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- || defined(__CYGWIN__)
++ || defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ signal_set_service::deliver_signal(signal_number);
+ #else // defined(BOOST_ASIO_WINDOWS)
+ // || defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // || defined(__CYGWIN__)
+ int saved_errno = errno;
+ signal_state* state = get_signal_state();
+ signed_size_type result = ::write(state->write_descriptor_,
+@@ -74,7 +72,6 @@ void boost_asio_signal_handler(int signa
+ errno = saved_errno;
+ #endif // defined(BOOST_ASIO_WINDOWS)
+ // || defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // || defined(__CYGWIN__)
+
+ #if defined(BOOST_ASIO_HAS_SIGNAL) && !defined(BOOST_ASIO_HAS_SIGACTION)
+ ::signal(signal_number, boost_asio_signal_handler);
+@@ -82,8 +79,7 @@ void boost_asio_signal_handler(int signa
+ }
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ class signal_set_service::pipe_read_op : public reactor_op
+ {
+ public:
+@@ -115,30 +111,25 @@ public:
+ };
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ signal_set_service::signal_set_service(
+ boost::asio::io_service& io_service)
+ : io_service_(boost::asio::use_service(io_service)),
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ reactor_(boost::asio::use_service(io_service)),
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ next_(0),
+ prev_(0)
+ {
+ get_signal_state()->mutex_.init();
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ reactor_.init_task();
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ for (int i = 0; i < max_signal_number; ++i)
+ registrations_[i] = 0;
+@@ -174,8 +165,7 @@ void signal_set_service::fork_service(
+ boost::asio::io_service::fork_event fork_ev)
+ {
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ signal_state* state = get_signal_state();
+ static_mutex::scoped_lock lock(state->mutex_);
+
+@@ -217,11 +207,9 @@ void signal_set_service::fork_service(
+ }
+ #else // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ (void)fork_ev;
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ }
+
+ void signal_set_service::construct(
+@@ -281,12 +269,12 @@ boost::system::error_code signal_set_ser
+ if (::signal(signal_number, boost_asio_signal_handler) == SIG_ERR)
+ # endif // defined(BOOST_ASIO_HAS_SIGACTION)
+ {
+-# if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# if defined(BOOST_ASIO_WINDOWS)
+ ec = boost::asio::error::invalid_argument;
+-# else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# else // defined(BOOST_ASIO_WINDOWS)
+ ec = boost::system::error_code(errno,
+ boost::asio::error::get_system_category());
+-# endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# endif // defined(BOOST_ASIO_WINDOWS)
+ delete new_registration;
+ return ec;
+ }
+@@ -351,12 +339,12 @@ boost::system::error_code signal_set_ser
+ if (::signal(signal_number, SIG_DFL) == SIG_ERR)
+ # endif // defined(BOOST_ASIO_HAS_SIGACTION)
+ {
+-# if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# if defined(BOOST_ASIO_WINDOWS)
+ ec = boost::asio::error::invalid_argument;
+-# else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# else // defined(BOOST_ASIO_WINDOWS)
+ ec = boost::system::error_code(errno,
+ boost::asio::error::get_system_category());
+-# endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# endif // defined(BOOST_ASIO_WINDOWS)
+ return ec;
+ }
+ }
+@@ -405,12 +393,12 @@ boost::system::error_code signal_set_ser
+ if (::signal(reg->signal_number_, SIG_DFL) == SIG_ERR)
+ # endif // defined(BOOST_ASIO_HAS_SIGACTION)
+ {
+-# if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# if defined(BOOST_ASIO_WINDOWS)
+ ec = boost::asio::error::invalid_argument;
+-# else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# else // defined(BOOST_ASIO_WINDOWS)
+ ec = boost::system::error_code(errno,
+ boost::asio::error::get_system_category());
+-# endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# endif // defined(BOOST_ASIO_WINDOWS)
+ return ec;
+ }
+ }
+@@ -500,11 +488,11 @@ void signal_set_service::add_service(sig
+ signal_state* state = get_signal_state();
+ static_mutex::scoped_lock lock(state->mutex_);
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+ // If this is the first service to be created, open a new pipe.
+ if (state->service_list_ == 0)
+ open_descriptors();
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ // Insert service into linked list of all services.
+ service->next_ = state->service_list_;
+@@ -514,8 +502,7 @@ void signal_set_service::add_service(sig
+ state->service_list_ = service;
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ // Register for pipe readiness notifications.
+ int read_descriptor = state->read_descriptor_;
+ lock.unlock();
+@@ -523,7 +510,6 @@ void signal_set_service::add_service(sig
+ read_descriptor, service->reactor_data_, new pipe_read_op);
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ }
+
+ void signal_set_service::remove_service(signal_set_service* service)
+@@ -534,8 +520,7 @@ void signal_set_service::remove_service(
+ if (service->next_ || service->prev_ || state->service_list_ == service)
+ {
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ // Disable the pipe readiness notifications.
+ int read_descriptor = state->read_descriptor_;
+ lock.unlock();
+@@ -544,7 +529,6 @@ void signal_set_service::remove_service(
+ lock.lock();
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ // Remove service from linked list of all services.
+ if (state->service_list_ == service)
+@@ -556,19 +540,18 @@ void signal_set_service::remove_service(
+ service->next_ = 0;
+ service->prev_ = 0;
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+ // If this is the last service to be removed, close the pipe.
+ if (state->service_list_ == 0)
+ close_descriptors();
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+ }
+ }
+
+ void signal_set_service::open_descriptors()
+ {
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ signal_state* state = get_signal_state();
+
+ int pipe_fds[2];
+@@ -593,14 +576,12 @@ void signal_set_service::open_descriptor
+ }
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ }
+
+ void signal_set_service::close_descriptors()
+ {
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ signal_state* state = get_signal_state();
+
+ if (state->read_descriptor_ != -1)
+@@ -612,7 +593,6 @@ void signal_set_service::close_descripto
+ state->write_descriptor_ = -1;
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+ }
+
+ void signal_set_service::start_wait_op(
+--- boost_1_57_0/boost/asio/detail/impl/socket_ops.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/socket_ops.ipp 2015-05-04 17:32:20.048025400 -0500
+@@ -33,12 +33,12 @@
+ # include
+ #endif // defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__) \
++#if defined(BOOST_ASIO_WINDOWS) \
+ || defined(__MACH__) && defined(__APPLE__)
+ # if defined(BOOST_ASIO_HAS_PTHREADS)
+ # include
+ # endif // defined(BOOST_ASIO_HAS_PTHREADS)
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ // || defined(__MACH__) && defined(__APPLE__)
+
+ #include
+@@ -50,9 +50,9 @@ namespace socket_ops {
+
+ #if !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ struct msghdr { int msg_namelen; };
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #if defined(__hpux)
+ // HP-UX doesn't declare these functions extern "C", so they are declared again
+@@ -65,7 +65,7 @@ extern "C" unsigned int if_nametoindex(c
+
+ inline void clear_last_error()
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ WSASetLastError(0);
+ #else
+ errno = 0;
+@@ -78,7 +78,7 @@ template
+ inline ReturnType error_wrapper(ReturnType return_value,
+ boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ ec = boost::system::error_code(WSAGetLastError(),
+ boost::asio::error::get_system_category());
+ #else
+@@ -313,11 +313,11 @@ int close(socket_type s, state_type& sta
+ }
+
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ result = error_wrapper(::closesocket(s), ec);
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ result = error_wrapper(::close(s), ec);
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ if (result != 0
+ && (ec == boost::asio::error::would_block
+@@ -329,10 +329,10 @@ int close(socket_type s, state_type& sta
+ // current OS where this behaviour is seen, Windows, says that the socket
+ // remains open. Therefore we'll put the descriptor back into blocking
+ // mode and have another attempt at closing it.
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ ioctl_arg_type arg = 0;
+ ::ioctlsocket(s, FIONBIO, &arg);
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ # if defined(__SYMBIAN32__)
+ int flags = ::fcntl(s, F_GETFL, 0);
+ if (flags >= 0)
+@@ -341,15 +341,15 @@ int close(socket_type s, state_type& sta
+ ioctl_arg_type arg = 0;
+ ::ioctl(s, FIONBIO, &arg);
+ # endif // defined(__SYMBIAN32__)
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ state &= ~non_blocking;
+
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ result = error_wrapper(::closesocket(s), ec);
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ result = error_wrapper(::close(s), ec);
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+ }
+
+@@ -368,7 +368,7 @@ bool set_user_non_blocking(socket_type s
+ }
+
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ ioctl_arg_type arg = (value ? 1 : 0);
+ int result = error_wrapper(::ioctlsocket(s, FIONBIO, &arg), ec);
+ #elif defined(__SYMBIAN32__)
+@@ -421,7 +421,7 @@ bool set_internal_non_blocking(socket_ty
+ }
+
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ ioctl_arg_type arg = (value ? 1 : 0);
+ int result = error_wrapper(::ioctlsocket(s, FIONBIO, &arg), ec);
+ #elif defined(__SYMBIAN32__)
+@@ -543,7 +543,6 @@ bool non_blocking_connect(socket_type s,
+ // Check if the connect operation has finished. This is required since we may
+ // get spurious readiness notifications from the reactor.
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(__CYGWIN__) \
+ || defined(__SYMBIAN32__)
+ fd_set write_fds;
+ FD_ZERO(&write_fds);
+@@ -556,7 +555,6 @@ bool non_blocking_connect(socket_type s,
+ zero_timeout.tv_usec = 0;
+ int ready = ::select(s + 1, 0, &write_fds, &except_fds, &zero_timeout);
+ #else // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ pollfd fds;
+ fds.fd = s;
+@@ -564,7 +562,6 @@ bool non_blocking_connect(socket_type s,
+ fds.revents = 0;
+ int ready = ::poll(&fds, 1, 0);
+ #endif // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ if (ready == 0)
+ {
+@@ -593,7 +590,7 @@ bool non_blocking_connect(socket_type s,
+ int socketpair(int af, int type, int protocol,
+ socket_type sv[2], boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ (void)(af);
+ (void)(type);
+ (void)(protocol);
+@@ -619,11 +616,11 @@ bool sockatmark(socket_type s, boost::sy
+
+ #if defined(SIOCATMARK)
+ ioctl_arg_type value = 0;
+-# if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# if defined(BOOST_ASIO_WINDOWS)
+ int result = error_wrapper(::ioctlsocket(s, SIOCATMARK, &value), ec);
+-# else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# else // defined(BOOST_ASIO_WINDOWS)
+ int result = error_wrapper(::ioctl(s, SIOCATMARK, &value), ec);
+-# endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++# endif // defined(BOOST_ASIO_WINDOWS)
+ if (result == 0)
+ ec = boost::system::error_code();
+ # if defined(ENOTTY)
+@@ -648,11 +645,11 @@ size_t available(socket_type s, boost::s
+ }
+
+ ioctl_arg_type value = 0;
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ int result = error_wrapper(::ioctlsocket(s, FIONREAD, &value), ec);
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ int result = error_wrapper(::ioctl(s, FIONREAD, &value), ec);
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ if (result == 0)
+ ec = boost::system::error_code();
+ #if defined(ENOTTY)
+@@ -689,32 +686,32 @@ inline void init_buf_iov_base(T& base, v
+ base = static_cast(addr);
+ }
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ typedef WSABUF buf;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ typedef iovec buf;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ void init_buf(buf& b, void* data, size_t size)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ b.buf = static_cast(data);
+ b.len = static_cast(size);
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ init_buf_iov_base(b.iov_base, data);
+ b.iov_len = size;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ void init_buf(buf& b, const void* data, size_t size)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ b.buf = static_cast(const_cast(data));
+ b.len = static_cast(size);
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ init_buf_iov_base(b.iov_base, const_cast(data));
+ b.iov_len = size;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ inline void init_msghdr_msg_name(void*& name, socket_addr_type* addr)
+@@ -743,7 +740,7 @@ signed_size_type recv(socket_type s, buf
+ int flags, boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ // Receive some data.
+ DWORD recv_buf_count = static_cast(count);
+ DWORD bytes_transferred = 0;
+@@ -758,7 +755,7 @@ signed_size_type recv(socket_type s, buf
+ return socket_error_retval;
+ ec = boost::system::error_code();
+ return bytes_transferred;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ msghdr msg = msghdr();
+ msg.msg_iov = bufs;
+ msg.msg_iovlen = static_cast(count);
+@@ -766,7 +763,7 @@ signed_size_type recv(socket_type s, buf
+ if (result >= 0)
+ ec = boost::system::error_code();
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ size_t sync_recv(socket_type s, state_type state, buf* bufs,
+@@ -889,7 +886,7 @@ signed_size_type recvfrom(socket_type s,
+ boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ // Receive some data.
+ DWORD recv_buf_count = static_cast(count);
+ DWORD bytes_transferred = 0;
+@@ -906,7 +903,7 @@ signed_size_type recvfrom(socket_type s,
+ return socket_error_retval;
+ ec = boost::system::error_code();
+ return bytes_transferred;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ msghdr msg = msghdr();
+ init_msghdr_msg_name(msg.msg_name, addr);
+ msg.msg_namelen = static_cast(*addrlen);
+@@ -917,7 +914,7 @@ signed_size_type recvfrom(socket_type s,
+ if (result >= 0)
+ ec = boost::system::error_code();
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ size_t sync_recvfrom(socket_type s, state_type state, buf* bufs,
+@@ -1014,10 +1011,10 @@ signed_size_type recvmsg(socket_type s,
+ int in_flags, int& out_flags, boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ out_flags = 0;
+ return socket_ops::recv(s, bufs, count, in_flags, ec);
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ msghdr msg = msghdr();
+ msg.msg_iov = bufs;
+ msg.msg_iovlen = static_cast(count);
+@@ -1030,7 +1027,7 @@ signed_size_type recvmsg(socket_type s,
+ else
+ out_flags = 0;
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ size_t sync_recvmsg(socket_type s, state_type state,
+@@ -1126,7 +1123,7 @@ signed_size_type send(socket_type s, con
+ int flags, boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ // Send the data.
+ DWORD send_buf_count = static_cast(count);
+ DWORD bytes_transferred = 0;
+@@ -1141,7 +1138,7 @@ signed_size_type send(socket_type s, con
+ return socket_error_retval;
+ ec = boost::system::error_code();
+ return bytes_transferred;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ msghdr msg = msghdr();
+ msg.msg_iov = const_cast(bufs);
+ msg.msg_iovlen = static_cast(count);
+@@ -1152,7 +1149,7 @@ signed_size_type send(socket_type s, con
+ if (result >= 0)
+ ec = boost::system::error_code();
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ size_t sync_send(socket_type s, state_type state, const buf* bufs,
+@@ -1253,7 +1250,7 @@ signed_size_type sendto(socket_type s, c
+ boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ // Send the data.
+ DWORD send_buf_count = static_cast(count);
+ DWORD bytes_transferred = 0;
+@@ -1268,7 +1265,7 @@ signed_size_type sendto(socket_type s, c
+ return socket_error_retval;
+ ec = boost::system::error_code();
+ return bytes_transferred;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ msghdr msg = msghdr();
+ init_msghdr_msg_name(msg.msg_name, addr);
+ msg.msg_namelen = static_cast(addrlen);
+@@ -1281,7 +1278,7 @@ signed_size_type sendto(socket_type s, c
+ if (result >= 0)
+ ec = boost::system::error_code();
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ size_t sync_sendto(socket_type s, state_type state, const buf* bufs,
+@@ -1358,7 +1355,7 @@ socket_type socket(int af, int type, int
+ boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ socket_type s = error_wrapper(::WSASocketW(af, type, protocol, 0, 0,
+ WSA_FLAG_OVERLAPPED), ec);
+ if (s == invalid_socket)
+@@ -1556,7 +1553,7 @@ int getsockopt(socket_type s, state_type
+ }
+ ec = boost::asio::error::fault;
+ return socket_error_retval;
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ clear_last_error();
+ int result = error_wrapper(call_getsockopt(&msghdr::msg_namelen,
+ s, level, optname, optval, optlen), ec);
+@@ -1574,7 +1571,7 @@ int getsockopt(socket_type s, state_type
+ if (result == 0)
+ ec = boost::system::error_code();
+ return result;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ clear_last_error();
+ int result = error_wrapper(call_getsockopt(&msghdr::msg_namelen,
+ s, level, optname, optval, optlen), ec);
+@@ -1593,7 +1590,7 @@ int getsockopt(socket_type s, state_type
+ if (result == 0)
+ ec = boost::system::error_code();
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ template
+@@ -1615,7 +1612,7 @@ int getpeername(socket_type s, socket_ad
+ return socket_error_retval;
+ }
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ if (cached)
+ {
+ // Check if socket is still connected.
+@@ -1636,9 +1633,9 @@ int getpeername(socket_type s, socket_ad
+ ec = boost::system::error_code();
+ return 0;
+ }
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ (void)cached;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ clear_last_error();
+ int result = error_wrapper(call_getpeername(
+@@ -1685,7 +1682,7 @@ int ioctl(socket_type s, state_type& sta
+ }
+
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ int result = error_wrapper(::ioctlsocket(s, cmd, arg), ec);
+ #elif defined(__MACH__) && defined(__APPLE__) \
+ || defined(__NetBSD__) || defined(__FreeBSD__) || defined(__OpenBSD__)
+@@ -1726,7 +1723,7 @@ int select(int nfds, fd_set* readfds, fd
+ fd_set* exceptfds, timeval* timeout, boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ if (!readfds && !writefds && !exceptfds && timeout)
+ {
+ DWORD milliseconds = timeout->tv_sec * 1000 + timeout->tv_usec / 1000;
+@@ -1746,7 +1743,7 @@ int select(int nfds, fd_set* readfds, fd
+ if (timeout && timeout->tv_sec == 0
+ && timeout->tv_usec > 0 && timeout->tv_usec < 1000)
+ timeout->tv_usec = 1000;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #if defined(__hpux) && defined(__SELECT)
+ timespec ts;
+@@ -1772,7 +1769,6 @@ int poll_read(socket_type s, state_type
+ }
+
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(__CYGWIN__) \
+ || defined(__SYMBIAN32__)
+ fd_set fds;
+ FD_ZERO(&fds);
+@@ -1784,7 +1780,6 @@ int poll_read(socket_type s, state_type
+ clear_last_error();
+ int result = error_wrapper(::select(s + 1, &fds, 0, 0, timeout), ec);
+ #else // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ pollfd fds;
+ fds.fd = s;
+@@ -1794,7 +1789,6 @@ int poll_read(socket_type s, state_type
+ clear_last_error();
+ int result = error_wrapper(::poll(&fds, 1, timeout), ec);
+ #endif // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ if (result == 0)
+ ec = (state & user_set_non_blocking)
+@@ -1813,7 +1807,6 @@ int poll_write(socket_type s, state_type
+ }
+
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(__CYGWIN__) \
+ || defined(__SYMBIAN32__)
+ fd_set fds;
+ FD_ZERO(&fds);
+@@ -1825,7 +1818,6 @@ int poll_write(socket_type s, state_type
+ clear_last_error();
+ int result = error_wrapper(::select(s + 1, 0, &fds, 0, timeout), ec);
+ #else // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ pollfd fds;
+ fds.fd = s;
+@@ -1835,7 +1827,6 @@ int poll_write(socket_type s, state_type
+ clear_last_error();
+ int result = error_wrapper(::poll(&fds, 1, timeout), ec);
+ #endif // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ if (result == 0)
+ ec = (state & user_set_non_blocking)
+@@ -1854,7 +1845,6 @@ int poll_connect(socket_type s, boost::s
+ }
+
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(__CYGWIN__) \
+ || defined(__SYMBIAN32__)
+ fd_set write_fds;
+ FD_ZERO(&write_fds);
+@@ -1869,7 +1859,6 @@ int poll_connect(socket_type s, boost::s
+ ec = boost::system::error_code();
+ return result;
+ #else // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ pollfd fds;
+ fds.fd = s;
+@@ -1881,7 +1870,6 @@ int poll_connect(socket_type s, boost::s
+ ec = boost::system::error_code();
+ return result;
+ #endif // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+ }
+
+@@ -1926,7 +1914,7 @@ const char* inet_ntop(int af, const void
+ ec = boost::asio::error::address_family_not_supported;
+ return 0;
+ }
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ using namespace std; // For memcpy.
+
+ if (af != BOOST_ASIO_OS_DEF(AF_INET) && af != BOOST_ASIO_OS_DEF(AF_INET6))
+@@ -1981,7 +1969,7 @@ const char* inet_ntop(int af, const void
+ ec = boost::asio::error::invalid_argument;
+
+ return result == socket_error_retval ? 0 : dest;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ const char* result = error_wrapper(::inet_ntop(
+ af, src, dest, static_cast(length)), ec);
+ if (result == 0 && !ec)
+@@ -2001,7 +1989,7 @@ const char* inet_ntop(int af, const void
+ strcat(dest, if_name);
+ }
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ int inet_pton(int af, const char* src, void* dest,
+@@ -2152,7 +2140,7 @@ int inet_pton(int af, const char* src, v
+ ec = boost::asio::error::address_family_not_supported;
+ return -1;
+ }
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ using namespace std; // For memcpy and strcmp.
+
+ if (af != BOOST_ASIO_OS_DEF(AF_INET) && af != BOOST_ASIO_OS_DEF(AF_INET6))
+@@ -2212,7 +2200,7 @@ int inet_pton(int af, const char* src, v
+ ec = boost::system::error_code();
+
+ return result == socket_error_retval ? -1 : 1;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ int result = error_wrapper(::inet_pton(af, src, dest), ec);
+ if (result <= 0 && !ec)
+ ec = boost::asio::error::invalid_argument;
+@@ -2234,7 +2222,7 @@ int inet_pton(int af, const char* src, v
+ }
+ }
+ return result;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ int gethostname(char* name, int namelen, boost::system::error_code& ec)
+@@ -2310,7 +2298,7 @@ inline hostent* gethostbyaddr(const char
+ hostent* result, char* buffer, int buflength, boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ (void)(buffer);
+ (void)(buflength);
+ hostent* retval = error_wrapper(::gethostbyaddr(addr, length, af), ec);
+@@ -2353,7 +2341,7 @@ inline hostent* gethostbyname(const char
+ char* buffer, int buflength, int ai_flags, boost::system::error_code& ec)
+ {
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ (void)(buffer);
+ (void)(buflength);
+ (void)(ai_flags);
+@@ -3153,7 +3141,7 @@ inline boost::system::error_code transla
+ case EAI_SOCKTYPE:
+ return boost::asio::error::socket_type_not_supported;
+ default: // Possibly the non-portable EAI_SYSTEM.
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ return boost::system::error_code(
+ WSAGetLastError(), boost::asio::error::get_system_category());
+ #else
+@@ -3170,7 +3158,7 @@ boost::system::error_code getaddrinfo(co
+ host = (host && *host) ? host : 0;
+ service = (service && *service) ? service : 0;
+ clear_last_error();
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # if defined(BOOST_ASIO_HAS_GETADDRINFO)
+ // Building for Windows XP, Windows Server 2003, or later.
+ int error = ::getaddrinfo(host, service, &hints, result);
+@@ -3213,7 +3201,7 @@ boost::system::error_code background_get
+
+ void freeaddrinfo(addrinfo_type* ai)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # if defined(BOOST_ASIO_HAS_GETADDRINFO)
+ // Building for Windows XP, Windows Server 2003, or later.
+ ::freeaddrinfo(ai);
+@@ -3241,7 +3229,7 @@ boost::system::error_code getnameinfo(co
+ std::size_t addrlen, char* host, std::size_t hostlen,
+ char* serv, std::size_t servlen, int flags, boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # if defined(BOOST_ASIO_HAS_GETADDRINFO)
+ // Building for Windows XP, Windows Server 2003, or later.
+ clear_last_error();
+--- boost_1_57_0/boost/asio/detail/impl/socket_select_interrupter.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/socket_select_interrupter.ipp 2015-05-04 17:33:18.861493700 -0500
+@@ -20,7 +20,6 @@
+ #if !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(__CYGWIN__) \
+ || defined(__SYMBIAN32__)
+
+ #include
+@@ -169,7 +168,6 @@ bool socket_select_interrupter::reset()
+ #include
+
+ #endif // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+
+ #endif // !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+--- boost_1_57_0/boost/asio/detail/impl/winsock_init.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/impl/winsock_init.ipp 2015-05-04 17:33:18.864494100 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+@@ -79,6 +79,6 @@ void winsock_init_base::throw_on_error(d
+
+ #include
+
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_IMPL_WINSOCK_INIT_IPP
+--- boost_1_57_0/boost/asio/detail/local_free_on_block_exit.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/local_free_on_block_exit.hpp 2015-05-04 17:33:18.867994600 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+@@ -54,6 +54,6 @@ private:
+
+ #include
+
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_LOCAL_FREE_ON_BLOCK_EXIT_HPP
+--- boost_1_57_0/boost/asio/detail/null_signal_blocker.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/null_signal_blocker.hpp 2015-05-04 17:33:18.870994900 -0500
+@@ -20,7 +20,6 @@
+ #if !defined(BOOST_ASIO_HAS_THREADS) \
+ || defined(BOOST_ASIO_WINDOWS) \
+ || defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- || defined(__CYGWIN__) \
+ || defined(__SYMBIAN32__)
+
+ #include
+@@ -65,7 +64,6 @@ public:
+ #endif // !defined(BOOST_ASIO_HAS_THREADS)
+ // || defined(BOOST_ASIO_WINDOWS)
+ // || defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+
+ #endif // BOOST_ASIO_DETAIL_NULL_SIGNAL_BLOCKER_HPP
+--- boost_1_57_0/boost/asio/detail/old_win_sdk_compat.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/old_win_sdk_compat.hpp 2015-05-04 17:33:18.874495400 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+
+ // Guess whether we are building against on old Platform SDK.
+ #if !defined(IN6ADDR_ANY_INIT)
+@@ -211,6 +211,6 @@ struct addrinfo_emulation
+ # define IPPROTO_ICMPV6 58
+ #endif
+
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_OLD_WIN_SDK_COMPAT_HPP
+--- boost_1_57_0/boost/asio/detail/pipe_select_interrupter.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/pipe_select_interrupter.hpp 2015-05-04 17:33:18.877995800 -0500
+@@ -19,7 +19,6 @@
+
+ #if !defined(BOOST_ASIO_WINDOWS)
+ #if !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+-#if !defined(__CYGWIN__)
+ #if !defined(__SYMBIAN32__)
+ #if !defined(BOOST_ASIO_HAS_EVENTFD)
+
+@@ -84,7 +83,6 @@ private:
+
+ #endif // !defined(BOOST_ASIO_HAS_EVENTFD)
+ #endif // !defined(__SYMBIAN32__)
+-#endif // !defined(__CYGWIN__)
+ #endif // !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+
+--- boost_1_57_0/boost/asio/detail/posix_fd_set_adapter.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/posix_fd_set_adapter.hpp 2015-05-04 17:33:18.881496300 -0500
+@@ -18,7 +18,6 @@
+ #include
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(__CYGWIN__) \
+ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #include
+@@ -114,7 +113,6 @@ private:
+ #include
+
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+- // && !defined(__CYGWIN__)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #endif // BOOST_ASIO_DETAIL_POSIX_FD_SET_ADAPTER_HPP
+--- boost_1_57_0/boost/asio/detail/reactive_descriptor_service.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/reactive_descriptor_service.hpp 2015-05-04 17:33:18.886496900 -0500
+@@ -18,8 +18,7 @@
+ #include
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #include
+ #include
+@@ -319,6 +318,5 @@ private:
+
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ #endif // BOOST_ASIO_DETAIL_REACTIVE_DESCRIPTOR_SERVICE_HPP
+--- boost_1_57_0/boost/asio/detail/reactive_serial_port_service.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/reactive_serial_port_service.hpp 2015-05-04 17:33:18.889497300 -0500
+@@ -19,7 +19,7 @@
+ #include
+
+ #if defined(BOOST_ASIO_HAS_SERIAL_PORT)
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+@@ -230,7 +230,7 @@ private:
+ # include
+ #endif // defined(BOOST_ASIO_HEADER_ONLY)
+
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+ #endif // defined(BOOST_ASIO_HAS_SERIAL_PORT)
+
+ #endif // BOOST_ASIO_DETAIL_REACTIVE_SERIAL_PORT_SERVICE_HPP
+--- boost_1_57_0/boost/asio/detail/select_interrupter.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/select_interrupter.hpp 2015-05-04 17:33:18.892497700 -0500
+@@ -19,7 +19,7 @@
+
+ #if !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__) || defined(__SYMBIAN32__)
++#if defined(BOOST_ASIO_WINDOWS) || defined(__SYMBIAN32__)
+ # include
+ #elif defined(BOOST_ASIO_HAS_EVENTFD)
+ # include
+@@ -31,7 +31,7 @@ namespace boost {
+ namespace asio {
+ namespace detail {
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__) || defined(__SYMBIAN32__)
++#if defined(BOOST_ASIO_WINDOWS) || defined(__SYMBIAN32__)
+ typedef socket_select_interrupter select_interrupter;
+ #elif defined(BOOST_ASIO_HAS_EVENTFD)
+ typedef eventfd_select_interrupter select_interrupter;
+--- boost_1_57_0/boost/asio/detail/select_reactor.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/select_reactor.hpp 2015-05-04 17:33:18.895498100 -0500
+@@ -51,13 +51,13 @@ class select_reactor
+ : public boost::asio::detail::service_base
+ {
+ public:
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ enum op_types { read_op = 0, write_op = 1, except_op = 2,
+ max_select_ops = 3, connect_op = 3, max_ops = 4 };
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ enum op_types { read_op = 0, write_op = 1, except_op = 2,
+ max_select_ops = 3, connect_op = 1, max_ops = 3 };
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ // Per-descriptor data.
+ struct per_descriptor_data
+--- boost_1_57_0/boost/asio/detail/signal_blocker.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/signal_blocker.hpp 2015-05-04 17:33:18.898498400 -0500
+@@ -19,7 +19,7 @@
+
+ #if !defined(BOOST_ASIO_HAS_THREADS) || defined(BOOST_ASIO_WINDOWS) \
+ || defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- || defined(__CYGWIN__) || defined(__SYMBIAN32__)
++ || defined(__SYMBIAN32__)
+ # include
+ #elif defined(BOOST_ASIO_HAS_PTHREADS)
+ # include
+@@ -33,7 +33,7 @@ namespace detail {
+
+ #if !defined(BOOST_ASIO_HAS_THREADS) || defined(BOOST_ASIO_WINDOWS) \
+ || defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- || defined(__CYGWIN__) || defined(__SYMBIAN32__)
++ || defined(__SYMBIAN32__)
+ typedef null_signal_blocker signal_blocker;
+ #elif defined(BOOST_ASIO_HAS_PTHREADS)
+ typedef posix_signal_blocker signal_blocker;
+--- boost_1_57_0/boost/asio/detail/signal_init.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/signal_init.hpp 2015-05-04 17:33:18.901998900 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+
+ #include
+
+@@ -44,6 +44,6 @@ public:
+
+ #include
+
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_SIGNAL_INIT_HPP
+--- boost_1_57_0/boost/asio/detail/signal_set_service.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/signal_set_service.hpp 2015-05-04 17:33:18.904999300 -0500
+@@ -28,9 +28,9 @@
+ #include
+ #include
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+ # include
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ #include
+
+@@ -183,8 +183,7 @@ private:
+ io_service_impl& io_service_;
+
+ #if !defined(BOOST_ASIO_WINDOWS) \
+- && !defined(BOOST_ASIO_WINDOWS_RUNTIME) \
+- && !defined(__CYGWIN__)
++ && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ // The type used for registering for pipe reactor notifications.
+ class pipe_read_op;
+
+@@ -195,7 +194,6 @@ private:
+ reactor::per_descriptor_data reactor_data_;
+ #endif // !defined(BOOST_ASIO_WINDOWS)
+ // && !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+- // && !defined(__CYGWIN__)
+
+ // A mapping from signal number to the registered signal sets.
+ registration* registrations_[max_signal_number];
+--- boost_1_57_0/boost/asio/detail/socket_ops.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/socket_ops.hpp 2015-05-04 17:33:18.907999600 -0500
+@@ -128,11 +128,11 @@ BOOST_ASIO_DECL size_t available(socket_
+ BOOST_ASIO_DECL int listen(socket_type s,
+ int backlog, boost::system::error_code& ec);
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ typedef WSABUF buf;
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ typedef iovec buf;
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ BOOST_ASIO_DECL void init_buf(buf& b, void* data, size_t size);
+
+--- boost_1_57_0/boost/asio/detail/socket_select_interrupter.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/socket_select_interrupter.hpp 2015-05-04 17:33:18.912500200 -0500
+@@ -20,7 +20,6 @@
+ #if !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(__CYGWIN__) \
+ || defined(__SYMBIAN32__)
+
+ #include
+@@ -85,7 +84,6 @@ private:
+ #endif // defined(BOOST_ASIO_HEADER_ONLY)
+
+ #endif // defined(BOOST_ASIO_WINDOWS)
+- // || defined(__CYGWIN__)
+ // || defined(__SYMBIAN32__)
+
+ #endif // !defined(BOOST_ASIO_WINDOWS_RUNTIME)
+--- boost_1_57_0/boost/asio/detail/socket_types.hpp 2015-05-04 17:16:30.021887400 -0500
++++ boost_1_57_0/boost/asio/detail/socket_types.hpp 2015-05-04 17:33:18.915500600 -0500
+@@ -19,7 +19,7 @@
+
+ #if defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ // Empty.
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ # if defined(_WINSOCKAPI_) && !defined(_WINSOCK2API_)
+ # error WinSock.h has already been included
+ # endif // defined(_WINSOCKAPI_) && !defined(_WINSOCK2API_)
+@@ -169,7 +169,7 @@ typedef int signed_size_type;
+ # define BOOST_ASIO_OS_DEF_AI_V4MAPPED 0x800
+ # define BOOST_ASIO_OS_DEF_AI_ALL 0x100
+ # define BOOST_ASIO_OS_DEF_AI_ADDRCONFIG 0x400
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ typedef SOCKET socket_type;
+ const SOCKET invalid_socket = INVALID_SOCKET;
+ const int socket_error_retval = SOCKET_ERROR;
+--- boost_1_57_0/boost/asio/detail/win_fd_set_adapter.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/win_fd_set_adapter.hpp 2015-05-04 17:33:18.919001000 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+@@ -146,6 +146,6 @@ private:
+
+ #include
+
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_WIN_FD_SET_ADAPTER_HPP
+--- boost_1_57_0/boost/asio/detail/winsock_init.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/detail/winsock_init.hpp 2015-05-04 17:33:18.923501600 -0500
+@@ -17,7 +17,7 @@
+
+ #include
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+
+ #include
+
+@@ -125,6 +125,6 @@ static const winsock_init<>& winsock_ini
+ # include
+ #endif // defined(BOOST_ASIO_HEADER_ONLY)
+
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+
+ #endif // BOOST_ASIO_DETAIL_WINSOCK_INIT_HPP
+--- boost_1_57_0/boost/asio/error.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/error.hpp 2015-05-04 17:33:18.926502000 -0500
+@@ -20,7 +20,6 @@
+ #include
+ #include
+ #if defined(BOOST_ASIO_WINDOWS) \
+- || defined(__CYGWIN__) \
+ || defined(BOOST_ASIO_WINDOWS_RUNTIME)
+ # include
+ #else
+@@ -45,7 +44,7 @@
+ # define BOOST_ASIO_NETDB_ERROR(e) __HRESULT_FROM_WIN32(WSA ## e)
+ # define BOOST_ASIO_GETADDRINFO_ERROR(e) __HRESULT_FROM_WIN32(WSA ## e)
+ # define BOOST_ASIO_WIN_OR_POSIX(e_win, e_posix) e_win
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ # define BOOST_ASIO_NATIVE_ERROR(e) e
+ # define BOOST_ASIO_SOCKET_ERROR(e) WSA ## e
+ # define BOOST_ASIO_NETDB_ERROR(e) WSA ## e
+@@ -225,7 +224,7 @@ inline const boost::system::error_catego
+ return boost::system::system_category();
+ }
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+
+ extern BOOST_ASIO_DECL
+ const boost::system::error_category& get_netdb_category();
+@@ -233,7 +232,7 @@ const boost::system::error_category& get
+ extern BOOST_ASIO_DECL
+ const boost::system::error_category& get_addrinfo_category();
+
+-#else // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#else // !defined(BOOST_ASIO_WINDOWS)
+
+ inline const boost::system::error_category& get_netdb_category()
+ {
+@@ -245,7 +244,7 @@ inline const boost::system::error_catego
+ return get_system_category();
+ }
+
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ extern BOOST_ASIO_DECL
+ const boost::system::error_category& get_misc_category();
+--- boost_1_57_0/boost/asio/impl/error.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/impl/error.ipp 2015-05-04 17:33:18.931002600 -0500
+@@ -25,7 +25,7 @@ namespace boost {
+ namespace asio {
+ namespace error {
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+
+ namespace detail {
+
+@@ -87,7 +87,7 @@ const boost::system::error_category& get
+ return instance;
+ }
+
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ namespace detail {
+
+--- boost_1_57_0/boost/asio/impl/serial_port_base.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/impl/serial_port_base.ipp 2015-05-04 17:33:18.936503300 -0500
+@@ -27,7 +27,7 @@
+
+ #if defined(GENERATING_DOCUMENTATION)
+ # define BOOST_ASIO_OPTION_STORAGE implementation_defined
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ # define BOOST_ASIO_OPTION_STORAGE DCB
+ #else
+ # define BOOST_ASIO_OPTION_STORAGE termios
+@@ -41,7 +41,7 @@ namespace asio {
+ boost::system::error_code serial_port_base::baud_rate::store(
+ BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec) const
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ storage.BaudRate = value_;
+ #else
+ speed_t baud;
+@@ -128,7 +128,7 @@ boost::system::error_code serial_port_ba
+ boost::system::error_code serial_port_base::baud_rate::load(
+ const BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ value_ = storage.BaudRate;
+ #else
+ speed_t baud = ::cfgetospeed(&storage);
+@@ -221,7 +221,7 @@ serial_port_base::flow_control::flow_con
+ boost::system::error_code serial_port_base::flow_control::store(
+ BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec) const
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ storage.fOutxCtsFlow = FALSE;
+ storage.fOutxDsrFlow = FALSE;
+ storage.fTXContinueOnXoff = TRUE;
+@@ -288,7 +288,7 @@ boost::system::error_code serial_port_ba
+ boost::system::error_code serial_port_base::flow_control::load(
+ const BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ if (storage.fOutX && storage.fInX)
+ {
+ value_ = software;
+@@ -339,7 +339,7 @@ serial_port_base::parity::parity(serial_
+ boost::system::error_code serial_port_base::parity::store(
+ BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec) const
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ switch (value_)
+ {
+ case none:
+@@ -386,7 +386,7 @@ boost::system::error_code serial_port_ba
+ boost::system::error_code serial_port_base::parity::load(
+ const BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ if (storage.Parity == EVENPARITY)
+ {
+ value_ = even;
+@@ -434,7 +434,7 @@ serial_port_base::stop_bits::stop_bits(
+ boost::system::error_code serial_port_base::stop_bits::store(
+ BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec) const
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ switch (value_)
+ {
+ case one:
+@@ -470,7 +470,7 @@ boost::system::error_code serial_port_ba
+ boost::system::error_code serial_port_base::stop_bits::load(
+ const BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ if (storage.StopBits == ONESTOPBIT)
+ {
+ value_ = one;
+@@ -507,7 +507,7 @@ serial_port_base::character_size::charac
+ boost::system::error_code serial_port_base::character_size::store(
+ BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec) const
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ storage.ByteSize = value_;
+ #else
+ storage.c_cflag &= ~CSIZE;
+@@ -527,7 +527,7 @@ boost::system::error_code serial_port_ba
+ boost::system::error_code serial_port_base::character_size::load(
+ const BOOST_ASIO_OPTION_STORAGE& storage, boost::system::error_code& ec)
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ value_ = storage.ByteSize;
+ #else
+ if ((storage.c_cflag & CSIZE) == CS5) { value_ = 5; }
+--- boost_1_57_0/boost/asio/io_service.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/io_service.hpp 2015-05-04 17:33:18.940003700 -0500
+@@ -24,7 +24,7 @@
+ #include
+ #include
+
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ # include
+ #elif defined(__sun) || defined(__QNX__) || defined(__hpux) || defined(_AIX) \
+ || defined(__osf__)
+@@ -600,7 +600,7 @@ public:
+ friend bool has_service(io_service& ios);
+
+ private:
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ detail::winsock_init<> init_;
+ #elif defined(__sun) || defined(__QNX__) || defined(__hpux) || defined(_AIX) \
+ || defined(__osf__)
+--- boost_1_57_0/boost/asio/serial_port_base.hpp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/serial_port_base.hpp 2015-05-04 17:33:18.943004100 -0500
+@@ -21,16 +21,16 @@
+ #if defined(BOOST_ASIO_HAS_SERIAL_PORT) \
+ || defined(GENERATING_DOCUMENTATION)
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+ # include
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ #include
+ #include
+
+ #if defined(GENERATING_DOCUMENTATION)
+ # define BOOST_ASIO_OPTION_STORAGE implementation_defined
+-#elif defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#elif defined(BOOST_ASIO_WINDOWS)
+ # define BOOST_ASIO_OPTION_STORAGE DCB
+ #else
+ # define BOOST_ASIO_OPTION_STORAGE termios
+--- boost_1_57_0/boost/asio/ssl/detail/impl/openssl_init.ipp 2014-10-17 17:49:08.000000000 -0500
++++ boost_1_57_0/boost/asio/ssl/detail/impl/openssl_init.ipp 2015-05-04 17:33:18.946504500 -0500
+@@ -85,15 +85,15 @@ public:
+ private:
+ static unsigned long openssl_id_func()
+ {
+-#if defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_ASIO_WINDOWS)
+ return ::GetCurrentThreadId();
+-#else // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#else // defined(BOOST_ASIO_WINDOWS)
+ void* id = instance()->thread_id_;
+ if (id == 0)
+ instance()->thread_id_ = id = &id; // Ugh.
+ BOOST_ASIO_ASSERT(sizeof(unsigned long) >= sizeof(void*));
+ return reinterpret_cast(id);
+-#endif // defined(BOOST_ASIO_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_ASIO_WINDOWS)
+ }
+
+ static void openssl_locking_func(int mode, int n,
+@@ -109,10 +109,10 @@ private:
+ std::vector > mutexes_;
+
+-#if !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#if !defined(BOOST_ASIO_WINDOWS)
+ // The thread identifiers to be used by openssl.
+ boost::asio::detail::tss_ptr thread_id_;
+-#endif // !defined(BOOST_ASIO_WINDOWS) && !defined(__CYGWIN__)
++#endif // !defined(BOOST_ASIO_WINDOWS)
+
+ #if !defined(SSL_OP_NO_COMPRESSION) \
+ && (OPENSSL_VERSION_NUMBER >= 0x00908000L)
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-config-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-config-cygwin.patch
new file mode 100644
index 00000000000..97acc72689d
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-config-cygwin.patch
@@ -0,0 +1,76 @@
+--- boost_1_57_0/boost/config/platform/cygwin.hpp 2015-05-04 18:02:21.742811600 -0500
++++ boost_1_57_0/boost/config/platform/cygwin.hpp 2015-05-04 17:16:30.183407900 -0500
+@@ -39,18 +39,8 @@
+ #define BOOST_HAS_STDINT_H
+ #endif
+
+-/// Cygwin has no fenv.h
+-#define BOOST_NO_FENV_H
+-
+ // boilerplate code:
+ #include
+-
+-//
+-// Cygwin lies about XSI conformance, there is no nl_types.h:
+-//
+-#ifdef BOOST_HAS_NL_TYPES_H
+-# undef BOOST_HAS_NL_TYPES_H
+-#endif
+
+
+
+--- boost_1_57_0/boost/config/stdlib/libstdcpp3.hpp 2014-10-26 07:36:42.000000000 -0500
++++ boost_1_57_0/boost/config/stdlib/libstdcpp3.hpp 2015-05-04 17:54:44.835791700 -0500
+@@ -68,7 +68,7 @@
+ #endif
+
+ // Apple doesn't seem to reliably defined a *unix* macro
+-#if !defined(CYGWIN) && ( defined(__unix__) \
++#if ( defined(__unix__) \
+ || defined(__unix) \
+ || defined(unix) \
+ || defined(__APPLE__) \
+--- boost_1_57_0/boost/config/stdlib/sgi.hpp 2014-10-26 07:36:42.000000000 -0500
++++ boost_1_57_0/boost/config/stdlib/sgi.hpp 2015-05-04 17:54:52.911817300 -0500
+@@ -41,7 +41,7 @@
+ #endif
+
+ // Apple doesn't seem to reliably defined a *unix* macro
+-#if !defined(CYGWIN) && ( defined(__unix__) \
++#if ( defined(__unix__) \
+ || defined(__unix) \
+ || defined(unix) \
+ || defined(__APPLE__) \
+--- boost_1_57_0/boost/config/stdlib/stlport.hpp 2014-10-26 07:36:42.000000000 -0500
++++ boost_1_57_0/boost/config/stdlib/stlport.hpp 2015-05-04 17:55:00.621796300 -0500
+@@ -17,7 +17,7 @@
+ #endif
+
+ // Apple doesn't seem to reliably defined a *unix* macro
+-#if !defined(CYGWIN) && ( defined(__unix__) \
++#if ( defined(__unix__) \
+ || defined(__unix) \
+ || defined(unix) \
+ || defined(__APPLE__) \
+--- boost_1_57_0/boost/config/stdlib/vacpp.hpp 2014-10-26 07:36:42.000000000 -0500
++++ boost_1_57_0/boost/config/stdlib/vacpp.hpp 2015-05-04 17:55:07.424660200 -0500
+@@ -13,7 +13,7 @@
+ #define BOOST_NO_STD_MESSAGES
+
+ // Apple doesn't seem to reliably defined a *unix* macro
+-#if !defined(CYGWIN) && ( defined(__unix__) \
++#if ( defined(__unix__) \
+ || defined(__unix) \
+ || defined(unix) \
+ || defined(__APPLE__) \
+--- boost_1_57_0/boost/predef/os/cygwin.h 2014-07-10 08:53:53.000000000 -0500
++++ boost_1_57_0/boost/predef/os/cygwin.h 2015-05-04 17:57:31.634472500 -0500
+@@ -29,7 +29,7 @@ http://www.boost.org/LICENSE_1_0.txt)
+ defined(__CYGWIN__) \
+ )
+ # undef BOOST_OS_CYGWIN
+-# define BOOST_OS_CGYWIN BOOST_VERSION_NUMBER_AVAILABLE
++# define BOOST_OS_CYGWIN BOOST_VERSION_NUMBER_AVAILABLE
+ #endif
+
+ #if BOOST_OS_CYGWIN
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-context-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-context-cygwin.patch
new file mode 100644
index 00000000000..3d9726179be
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-context-cygwin.patch
@@ -0,0 +1,600 @@
+--- boost_1_57_0/libs/context/build/Jamfile.v2 2014-10-20 01:26:00.000000000 -0500
++++ boost_1_57_0/libs/context/build/Jamfile.v2 2015-05-04 17:43:10.812161900 -0500
+@@ -29,6 +29,7 @@ local rule default_binary_format ( )
+ local tmp = elf ;
+ if [ os.name ] = "MACOSX" { tmp = mach-o ; }
+ if [ os.name ] = "NT" { tmp = pe ; }
++ if [ os.name ] = "CYGWIN" { tmp = pe ; }
+ if [ os.name ] = "AIX" { tmp = xcoff ; }
+ return $(tmp) ;
+ }
+@@ -581,6 +582,16 @@ alias asm_context_sources
+ ;
+
+ alias asm_context_sources
++ : asm/make_i386_ms_pe_gas.S
++ asm/jump_i386_ms_pe_gas.S
++ dummy.cpp
++ : 32
++ x86
++ pe
++ gcc
++ ;
++
++alias asm_context_sources
+ : asm/make_i386_ms_pe_masm.asm
+ asm/jump_i386_ms_pe_masm.asm
+ dummy.cpp
+@@ -715,6 +726,16 @@ alias asm_context_sources
+ ;
+
+ alias asm_context_sources
++ : asm/make_x86_64_ms_pe_gas.S
++ asm/jump_x86_64_ms_pe_gas.S
++ dummy.cpp
++ : 64
++ x86
++ pe
++ gcc
++ ;
++
++alias asm_context_sources
+ : asm/make_x86_64_ms_pe_masm.asm
+ asm/jump_x86_64_ms_pe_masm.asm
+ dummy.cpp
+--- boost_1_57_0/libs/context/src/asm/jump_i386_ms_pe_gas.S 1969-12-31 18:00:00.000000000 -0600
++++ boost_1_57_0/libs/context/src/asm/jump_i386_ms_pe_gas.S 2015-05-04 17:43:10.821663100 -0500
+@@ -0,0 +1,108 @@
++/*
++ Copyright Oliver Kowalke 2009.
++ Copyright Thomas Sailer 2013.
++ Distributed under the Boost Software License, Version 1.0.
++ (See accompanying file LICENSE_1_0.txt or copy at
++ http://www.boost.org/LICENSE_1_0.txt)
++*/
++
++/********************************************************************
++ * *
++ * -------------------------------------------------------------- *
++ * | 0 | 1 | 2 | 3 | 4 | 5 | *
++ * -------------------------------------------------------------- *
++ * | 0h | 04h | 08h | 0ch | 010h | 014h | *
++ * -------------------------------------------------------------- *
++ * | EDI | ESI | EBX | EBP | ESP | EIP | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 6 | 7 | 8 | | *
++ * -------------------------------------------------------------- *
++ * | 018h | 01ch | 020h | | *
++ * -------------------------------------------------------------- *
++ * | sp | size | limit | | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 9 | | *
++ * -------------------------------------------------------------- *
++ * | 024h | | *
++ * -------------------------------------------------------------- *
++ * |fc_execpt| | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 10 | | *
++ * -------------------------------------------------------------- *
++ * | 028h | | *
++ * -------------------------------------------------------------- *
++ * |fc_strage| | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 11 | 12 | | *
++ * -------------------------------------------------------------- *
++ * | 02ch | 030h | | *
++ * -------------------------------------------------------------- *
++ * | fc_mxcsr|fc_x87_cw| | *
++ * -------------------------------------------------------------- *
++ * *
++ * *****************************************************************/
++
++.file "jump_i386_ms_pe_gas.S"
++.text
++.p2align 4,,15
++.globl _jump_fcontext
++.def _jump_fcontext; .scl 2; .type 32; .endef
++_jump_fcontext:
++ movl 0x04(%esp), %ecx /* load address of the first fcontext_t arg */
++ movl %edi, (%ecx) /* save EDI */
++ movl %esi, 0x04(%ecx) /* save ESI */
++ movl %ebx, 0x08(%ecx) /* save EBX */
++ movl %ebp, 0x0c(%ecx) /* save EBP */
++
++ movl %fs:(0x18), %edx /* load NT_TIB */
++ movl (%edx), %eax /* load current SEH exception list */
++ movl %eax, 0x24(%ecx) /* save current exception list */
++ movl 0x04(%edx), %eax /* load current stack base */
++ movl %eax, 0x18(%ecx) /* save current stack base */
++ movl 0x08(%edx), %eax /* load current stack limit */
++ movl %eax, 0x20(%ecx) /* save current stack limit */
++ movl 0x10(%edx), %eax /* load fiber local storage */
++ movl %eax, 0x28(%ecx) /* save fiber local storage */
++
++ leal 0x04(%esp), %eax /* exclude the return address */
++ movl %eax, 0x10(%ecx) /* save as stack pointer */
++ movl (%esp), %eax /* load return address */
++ movl %eax, 0x14(%ecx) /* save return address */
++
++ movl 0x08(%esp), %edx /* load address of the second fcontext_t arg */
++ movl (%edx), %edi /* restore EDI */
++ movl 0x04(%edx), %esi /* restore ESI */
++ movl 0x08(%edx), %ebx /* restore EBX */
++ movl 0x0c(%edx), %ebp /* restore EBP */
++
++ movl 0x10(%esp), %eax /* check if fpu enve preserving was requested */
++ testl %eax, %eax
++ je 1f
++
++ stmxcsr 0x2c(%ecx) /* save MMX control word */
++ fnstcw 0x30(%ecx) /* save x87 control word */
++ ldmxcsr 0x2c(%edx) /* restore MMX control word */
++ fldcw 0x30(%edx) /* restore x87 control word */
++1:
++ movl %edx, %ecx
++ movl %fs:(0x18), %edx /* load NT_TIB */
++ movl 0x24(%ecx), %eax /* load SEH exception list */
++ movl %eax, (%edx) /* restore next SEH item */
++ movl 0x18(%ecx), %eax /* load stack base */
++ movl %eax, 0x04(%edx) /* restore stack base */
++ movl 0x20(%ecx), %eax /* load stack limit */
++ movl %eax, 0x08(%edx) /* restore stack limit */
++ movl 0x28(%ecx), %eax /* load fiber local storage */
++ movl %eax, 0x10(%edx) /* restore fiber local storage */
++
++ movl 0x0c(%esp), %eax /* use third arg as return value after jump */
++
++ movl 0x10(%ecx), %esp /* restore ESP */
++ movl %eax, 0x04(%esp) /* use third arg as first arg in context function */
++ movl 0x14(%ecx), %ecx /* fetch the address to return to */
++
++ jmp *%ecx /* indirect jump to context */
+--- boost_1_57_0/libs/context/src/asm/jump_x86_64_ms_pe_gas.S 1969-12-31 18:00:00.000000000 -0600
++++ boost_1_57_0/libs/context/src/asm/jump_x86_64_ms_pe_gas.S 2015-05-04 17:43:10.829664200 -0500
+@@ -0,0 +1,189 @@
++/*
++ Copyright Oliver Kowalke 2009.
++ Copyright Thomas Sailer 2013.
++ Distributed under the Boost Software License, Version 1.0.
++ (See accompanying file LICENSE_1_0.txt or copy at
++ http://www.boost.org/LICENSE_1_0.txt)
++*/
++
++/****************************************************************************************
++ * *
++ * ---------------------------------------------------------------------------------- *
++ * | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x0 | 0x4 | 0x8 | 0xc | 0x10 | 0x14 | 0x18 | 0x1c | *
++ * ---------------------------------------------------------------------------------- *
++ * | R12 | R13 | R14 | R15 | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x20 | 0x24 | 0x28 | 0x2c | 0x30 | 0x34 | 0x38 | 0x3c | *
++ * ---------------------------------------------------------------------------------- *
++ * | RDI | RSI | RBX | RBP | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 16 | 17 | 18 | 19 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x40 | 0x44 | 0x48 | 0x4c | | *
++ * ---------------------------------------------------------------------------------- *
++ * | RSP | RIP | | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 20 | 21 | 22 | 23 | 24 | 25 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x50 | 0x54 | 0x58 | 0x5c | 0x60 | 0x64 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | sp | size | limit | | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 26 | 27 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x68 | 0x6c | | *
++ * ---------------------------------------------------------------------------------- *
++ * | fbr_strg | | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x70 | 0x74 | 0x78 | 0x7c | 0x80 | 0x84 | 0x88 | 0x8c | *
++ * ---------------------------------------------------------------------------------- *
++ * | fc_mxcsr|fc_x87_cw| fc_xmm | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x90 | 0x94 | 0x98 | 0x9c | 0xa0 | 0xa4 | 0xa8 | 0xac | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0xb0 | 0xb4 | 0xb8 | 0xbc | 0xc0 | 0xc4 | 0xc8 | 0xcc | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0xd0 | 0xd4 | 0xd8 | 0xdc | 0xe0 | 0xe4 | 0xe8 | 0xec | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0xf0 | 0xf4 | 0xf8 | 0xfc | 0x100 | 0x104 | 0x108 | 0x10c | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x110 | 0x114 | 0x118 | 0x11c | 0x120 | 0x124 | 0x128 | 0x12c | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * *
++ * *************************************************************************************/
++
++.file "jump_x86_64_ms_pe_gas.S"
++.text
++.p2align 4,,15
++.globl jump_fcontext
++.def jump_fcontext; .scl 2; .type 32; .endef
++.seh_proc jump_fcontext
++jump_fcontext:
++.seh_endprologue
++ movq %r12, (%rcx) /* save R12 */
++ movq %r13, 0x08(%rcx) /* save R13 */
++ movq %r14, 0x10(%rcx) /* save R14 */
++ movq %r15, 0x18(%rcx) /* save R15 */
++ movq %rdi, 0x20(%rcx) /* save RDI */
++ movq %rsi, 0x28(%rcx) /* save RSI */
++ movq %rbx, 0x30(%rcx) /* save RBX */
++ movq %rbp, 0x38(%rcx) /* save RBP */
++
++ movq %gs:(0x30), %r10 /* load NT_TIB */
++ movq 0x08(%r10), %rax /* load current stack base */
++ movq %rax, 0x50(%rcx) /* save current stack base */
++ movq 0x10(%r10), %rax /* load current stack limit */
++ movq %rax, 0x60(%rcx) /* save current stack limit */
++ movq 0x18(%r10), %rax /* load fiber local storage */
++ movq %rax, 0x68(%rcx) /* save fiber local storage */
++
++ testq %r9, %r9
++ je 1f
++
++ stmxcsr 0x70(%rcx) /* save MMX control and status word */
++ fnstcw 0x74(%rcx) /* save x87 control word */
++ /* save XMM storage */
++ /* save start address of SSE register block in R10 */
++ leaq 0x90(%rcx), %r10
++ /* shift address in R10 to lower 16 byte boundary */
++ /* == pointer to SEE register block */
++ andq $-16, %r10
++
++ movaps %xmm6, (%r10)
++ movaps %xmm7, 0x10(%r10)
++ movaps %xmm8, 0x20(%r10)
++ movaps %xmm9, 0x30(%r10)
++ movaps %xmm10, 0x40(%r10)
++ movaps %xmm11, 0x50(%r10)
++ movaps %xmm12, 0x60(%r10)
++ movaps %xmm13, 0x70(%r10)
++ movaps %xmm14, 0x80(%r10)
++ movaps %xmm15, 0x90(%r10)
++
++ ldmxcsr 0x70(%rdx) /* restore MMX control and status word */
++ fldcw 0x74(%rdx) /* restore x87 control word */
++ /* restore XMM storage */
++ /* save start address of SSE register block in R10 */
++ leaq 0x90(%rdx), %r10
++ /* shift address in R10 to lower 16 byte boundary */
++ /* == pointer to SEE register block */
++ andq $-16, %r10
++
++ movaps (%r10), %xmm6
++ movaps 0x10(%r10), %xmm7
++ movaps 0x20(%r10), %xmm8
++ movaps 0x30(%r10), %xmm9
++ movaps 0x40(%r10), %xmm10
++ movaps 0x50(%r10), %xmm11
++ movaps 0x60(%r10), %xmm12
++ movaps 0x70(%r10), %xmm13
++ movaps 0x80(%r10), %xmm14
++ movaps 0x90(%r10), %xmm15
++
++1:
++ leaq 0x08(%rsp), %rax /* exclude the return address */
++ movq %rax, 0x40(%rcx) /* save as stack pointer */
++ movq (%rsp), %rax /* load return address */
++ movq %rax, 0x48(%rcx) /* save return address */
++
++ movq (%rdx), %r12 /* restore R12 */
++ movq 0x08(%rdx), %r13 /* restore R13 */
++ movq 0x10(%rdx), %r14 /* restore R14 */
++ movq 0x18(%rdx), %r15 /* restore R15 */
++ movq 0x20(%rdx), %rdi /* restore RDI */
++ movq 0x28(%rdx), %rsi /* restore RSI */
++ movq 0x30(%rdx), %rbx /* restore RBX */
++ movq 0x38(%rdx), %rbp /* restore RBP */
++
++ movq %gs:(0x30), %r10 /* load NT_TIB */
++ movq 0x50(%rdx), %rax /* load stack base */
++ movq %rax, 0x08(%r10) /* restore stack base */
++ movq 0x60(%rdx), %rax /* load stack limit */
++ movq %rax, 0x10(%r10) /* restore stack limit */
++ movq 0x68(%rdx), %rax /* load fiber local storage */
++ movq %rax, 0x18(%r10) /* restore fiber local storage */
++
++ movq 0x40(%rdx), %rsp /* restore RSP */
++ movq 0x48(%rdx), %r10 /* fetch the address to returned to */
++
++ movq %r8, %rax /* use third arg as return value after jump */
++ movq %r8, %rcx /* use third arg as first arg in context function */
++
++ jmp *%r10 /* indirect jump to caller */
++.seh_endproc
+--- boost_1_57_0/libs/context/src/asm/make_i386_ms_pe_gas.S 1969-12-31 18:00:00.000000000 -0600
++++ boost_1_57_0/libs/context/src/asm/make_i386_ms_pe_gas.S 2015-05-04 17:43:10.836165000 -0500
+@@ -0,0 +1,115 @@
++/*
++ Copyright Oliver Kowalke 2009.
++ Copyright Thomas Sailer 2013.
++ Distributed under the Boost Software License, Version 1.0.
++ (See accompanying file LICENSE_1_0.txt or copy at
++ http://www.boost.org/LICENSE_1_0.txt)
++*/
++
++/********************************************************************
++ * *
++ * -------------------------------------------------------------- *
++ * | 0 | 1 | 2 | 3 | 4 | 5 | *
++ * -------------------------------------------------------------- *
++ * | 0h | 04h | 08h | 0ch | 010h | 014h | *
++ * -------------------------------------------------------------- *
++ * | EDI | ESI | EBX | EBP | ESP | EIP | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 6 | 7 | 8 | | *
++ * -------------------------------------------------------------- *
++ * | 018h | 01ch | 020h | | *
++ * -------------------------------------------------------------- *
++ * | sp | size | limit | | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 9 | | *
++ * -------------------------------------------------------------- *
++ * | 024h | | *
++ * -------------------------------------------------------------- *
++ * |fc_execpt| | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 10 | | *
++ * -------------------------------------------------------------- *
++ * | 028h | | *
++ * -------------------------------------------------------------- *
++ * |fc_strage| | *
++ * -------------------------------------------------------------- *
++ * -------------------------------------------------------------- *
++ * | 11 | 12 | | *
++ * -------------------------------------------------------------- *
++ * | 02ch | 030h | | *
++ * -------------------------------------------------------------- *
++ * | fc_mxcsr|fc_x87_cw| | *
++ * -------------------------------------------------------------- *
++ * *
++ * *****************************************************************/
++
++.file "make_i386_ms_pe_gas.S"
++.text
++.p2align 4,,15
++.globl _make_fcontext
++.def _make_fcontext; .scl 2; .type 32; .endef
++_make_fcontext:
++ movl 0x04(%esp), %eax /* load 1. arg of make_fcontext, pointer to context stack (base) */
++ leal -0x34(%eax),%eax /* reserve space for fcontext_t at top of context stack */
++
++ /* shift address in EAX to lower 16 byte boundary */
++ /* == pointer to fcontext_t and address of context stack */
++ andl $-16, %eax
++
++ movl 0x04(%esp), %ecx /* load 1. arg of make_fcontext, pointer to context stack (base) */
++ movl %ecx, 0x18(%eax) /* save address of context stack (base) in fcontext_t */
++ movl 0x08(%esp), %edx /* load 2. arg of make_fcontext, context stack size */
++ movl %edx, 0x1c(%eax) /* save context stack size in fcontext_t */
++ negl %edx /* negate stack size for LEA instruction (== substraction) */
++ leal (%ecx,%edx),%ecx /* compute bottom address of context stack (limit) */
++ movl %ecx, 0x20(%eax) /* save address of context stack (limit) in fcontext_t */
++ movl 0x0c(%esp), %ecx /* load 3. arg of make_fcontext, pointer to context function */
++ movl %ecx, 0x14(%eax) /* save address of context function in fcontext_t */
++
++ stmxcsr 0x02c(%eax) /* save MMX control word */
++ fnstcw 0x030(%eax) /* save x87 control word */
++
++ leal -0x1c(%eax),%edx /* reserve space for last frame and seh on context stack, (ESP - 0x4) % 16 == 0 */
++ movl %edx, 0x10(%eax) /* save address in EDX as stack pointer for context function */
++
++ movl $finish, %ecx /* abs address of finish */
++ movl %ecx, (%edx) /* save address of finish as return address for context function */
++ /* entered after context function returns */
++
++ /* traverse current seh chain to get the last exception handler installed by Windows */
++ /* note that on Windows Server 2008 and 2008 R2, SEHOP is activated by default */
++ /* the exception handler chain is tested for the presence of ntdll.dll!FinalExceptionHandler */
++ /* at its end by RaiseException all seh andlers are disregarded if not present and the */
++ /* program is aborted */
++ movl %fs:(0x18), %ecx /* load NT_TIB into ECX */
++
++walk:
++ movl (%ecx), %edx /* load 'next' member of current SEH into EDX */
++ incl %edx /* test if 'next' of current SEH is last (== 0xffffffff) */
++ jz found
++ decl %edx
++ xchgl %ecx, %edx /* exchange content; ECX contains address of next SEH */
++ jmp walk /* inspect next SEH */
++
++found:
++ movl 0x04(%ecx), %ecx /* load 'handler' member of SEH == address of last SEH handler installed by Windows */
++ movl 0x10(%eax), %edx /* load address of stack pointer for context function */
++ movl %ecx, 0x18(%edx) /* save address in ECX as SEH handler for context */
++ movl $0xffffffff,%ecx /* set ECX to -1 */
++ movl %ecx, 0x14(%edx) /* save ECX as next SEH item */
++ leal 0x14(%edx), %ecx /* load address of next SEH item */
++ movl %ecx, 0x24(%eax) /* save next SEH */
++
++ ret
++
++finish:
++ /* ESP points to same address as ESP on entry of context function + 0x4 */
++ xorl %eax, %eax
++ movl %eax, (%esp) /* exit code is zero */
++ call __exit /* exit application */
++ hlt
++
++.def __exit; .scl 2; .type 32; .endef /* standard C library function */
+--- boost_1_57_0/libs/context/src/asm/make_x86_64_ms_pe_gas.S 1969-12-31 18:00:00.000000000 -0600
++++ boost_1_57_0/libs/context/src/asm/make_x86_64_ms_pe_gas.S 2015-05-04 17:43:10.843165900 -0500
+@@ -0,0 +1,132 @@
++/*
++ Copyright Oliver Kowalke 2009.
++ Copyright Thomas Sailer 2013.
++ Distributed under the Boost Software License, Version 1.0.
++ (See accompanying file LICENSE_1_0.txt or copy at
++ http://www.boost.org/LICENSE_1_0.txt)
++*/
++
++/****************************************************************************************
++ * *
++ * ---------------------------------------------------------------------------------- *
++ * | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x0 | 0x4 | 0x8 | 0xc | 0x10 | 0x14 | 0x18 | 0x1c | *
++ * ---------------------------------------------------------------------------------- *
++ * | R12 | R13 | R14 | R15 | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x20 | 0x24 | 0x28 | 0x2c | 0x30 | 0x34 | 0x38 | 0x3c | *
++ * ---------------------------------------------------------------------------------- *
++ * | RDI | RSI | RBX | RBP | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 16 | 17 | 18 | 19 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x40 | 0x44 | 0x48 | 0x4c | | *
++ * ---------------------------------------------------------------------------------- *
++ * | RSP | RIP | | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 20 | 21 | 22 | 23 | 24 | 25 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x50 | 0x54 | 0x58 | 0x5c | 0x60 | 0x64 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | sp | size | limit | | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 26 | 27 | | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x68 | 0x6c | | *
++ * ---------------------------------------------------------------------------------- *
++ * | fbr_strg | | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x70 | 0x74 | 0x78 | 0x7c | 0x80 | 0x84 | 0x88 | 0x8c | *
++ * ---------------------------------------------------------------------------------- *
++ * | fc_mxcsr|fc_x87_cw| fc_xmm | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x90 | 0x94 | 0x98 | 0x9c | 0xa0 | 0xa4 | 0xa8 | 0xac | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0xb0 | 0xb4 | 0xb8 | 0xbc | 0xc0 | 0xc4 | 0xc8 | 0xcc | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0xd0 | 0xd4 | 0xd8 | 0xdc | 0xe0 | 0xe4 | 0xe8 | 0xec | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0xf0 | 0xf4 | 0xf8 | 0xfc | 0x100 | 0x104 | 0x108 | 0x10c | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * ---------------------------------------------------------------------------------- *
++ * | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | *
++ * ---------------------------------------------------------------------------------- *
++ * | 0x110 | 0x114 | 0x118 | 0x11c | 0x120 | 0x124 | 0x128 | 0x12c | *
++ * ---------------------------------------------------------------------------------- *
++ * | SEE registers (XMM6-XMM15) | *
++ * ---------------------------------------------------------------------------------- *
++ * *
++ * *************************************************************************************/
++
++.file "make_x86_64_ms_pe_gas.S"
++.text
++.p2align 4,,15
++.globl make_fcontext
++.def make_fcontext; .scl 2; .type 32; .endef
++.seh_proc make_fcontext
++make_fcontext:
++.seh_endprologue
++ leaq -0x130(%rcx),%rax /* reserve space for fcontext_t at top of context stack */
++
++ /* shift address in RAX to lower 16 byte boundary */
++ /* == pointer to fcontext_t and address of context stack */
++ andq $-16, %rax
++
++ movq %r8, 0x48(%rax) /* save address of context function in fcontext_t */
++ movq %rdx, 0x58(%rax) /* save context stack size in fcontext_t */
++ movq %rcx, 0x50(%rax) /* save address of context stack pointer (base) in fcontext_t */
++
++ negq %rdx /* negate stack size for LEA instruction (== substraction) */
++ leaq (%rcx,%rdx),%rcx /* compute bottom address of context stack (limit) */
++ movq %rcx, 0x60(%rax) /* save bottom address of context stack (limit) in fcontext_t */
++
++ stmxcsr 0x70(%rax) /* save MMX control and status word */
++ fnstcw 0x74(%rax) /* save x87 control word */
++
++ leaq -0x28(%rax),%rdx /* reserve 32byte shadow space + return address on stack, (RSP - 0x8) % 16 == 0 */
++ movq %rdx, 0x40(%rax) /* save address in RDX as stack pointer for context function */
++
++ leaq finish(%rip),%rcx /* compute abs address of label finish */
++ movq %rcx,(%rdx) /* save address of finish as return address for context function */
++ /* entered after context function returns */
++
++ ret
++
++finish:
++ /* RSP points to same address as RSP on entry of context function + 0x8 */
++ xorq %rcx, %rcx /* exit code is zero */
++ call _exit /* exit application */
++ hlt
++.seh_endproc
++
++.def _exit; .scl 2; .type 32; .endef /* standard C library function */
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-filesystem-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-filesystem-cygwin.patch
new file mode 100644
index 00000000000..cbb5757746d
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-filesystem-cygwin.patch
@@ -0,0 +1,32 @@
+--- boost_1_57_0/libs/filesystem/src/operations.cpp 2014-10-29 10:34:00.000000000 -0500
++++ boost_1_57_0/libs/filesystem/src/operations.cpp 2015-05-04 23:30:34.278446000 -0500
+@@ -1966,8 +1966,7 @@ namespace
+ {
+ errno = 0;
+
+-# if !defined(__CYGWIN__)\
+- && defined(_POSIX_THREAD_SAFE_FUNCTIONS)\
++# if defined(_POSIX_THREAD_SAFE_FUNCTIONS)\
+ && defined(_SC_THREAD_SAFE_FUNCTIONS)\
+ && (_POSIX_THREAD_SAFE_FUNCTIONS+0 >= 0)\
+ && (!defined(__hpux) || defined(_REENTRANT)) \
+--- boost_1_57_0/libs/filesystem/src/path.cpp 2014-10-29 10:34:00.000000000 -0500
++++ boost_1_57_0/libs/filesystem/src/path.cpp 2015-05-04 17:45:45.582315200 -0500
+@@ -36,7 +36,7 @@
+ # include "windows_file_codecvt.hpp"
+ # include
+ #elif defined(macintosh) || defined(__APPLE__) || defined(__APPLE_CC__) \
+- || defined(__FreeBSD__) || defined(__OPEN_BSD__)
++ || defined(__FreeBSD__) || defined(__OPEN_BSD__) || defined(__CYGWIN__)
+ # include
+ #endif
+
+@@ -831,7 +831,7 @@ namespace
+ std::locale global_loc = std::locale();
+ return std::locale(global_loc, new windows_file_codecvt);
+ # elif defined(macintosh) || defined(__APPLE__) || defined(__APPLE_CC__) \
+- || defined(__FreeBSD__) || defined(__OpenBSD__)
++ || defined(__FreeBSD__) || defined(__OpenBSD__) || defined(__CYGWIN__)
+ // "All BSD system functions expect their string parameters to be in UTF-8 encoding
+ // and nothing else." See
+ // http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPInternational/Articles/FileEncodings.html
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-locale-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-locale-cygwin.patch
new file mode 100644
index 00000000000..16208385a9b
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-locale-cygwin.patch
@@ -0,0 +1,81 @@
+--- boost_1_57_0/libs/locale/build/Jamfile.v2 2014-04-06 08:11:49.000000000 -0500
++++ boost_1_57_0/libs/locale/build/Jamfile.v2 2015-05-04 18:11:52.956846500 -0500
+@@ -261,7 +261,7 @@ rule configure-full ( properties * : fla
+
+ }
+
+- if ! $(found-iconv) && ! $(found-icu) && ! windows in $(properties) && ! cygwin in $(properties)
++ if ! $(found-iconv) && ! $(found-icu) && ! windows in $(properties)
+ {
+ ECHO "- Boost.Locale needs either iconv or ICU library to be built." ;
+ result += no ;
+@@ -298,7 +298,6 @@ rule configure-full ( properties * : fla
+ if ! in $(properties:G)
+ {
+ if windows in $(properties)
+- || cygwin in $(properties)
+ {
+ properties += on ;
+ }
+@@ -335,7 +334,7 @@ rule configure-full ( properties * : fla
+ }
+
+ if ( ! off in $(properties) || ! off in $(properties) )
+- && ( windows in $(properties) || cygwin in $(properties) )
++ && windows in $(properties)
+ {
+ result += win32/lcid.cpp ;
+ }
+--- boost_1_57_0/libs/locale/src/encoding/codepage.cpp 2014-04-06 08:11:49.000000000 -0500
++++ boost_1_57_0/libs/locale/src/encoding/codepage.cpp 2015-05-04 23:16:01.778652600 -0500
+@@ -8,7 +8,7 @@
+ #define BOOST_LOCALE_SOURCE
+ #include
+
+-#if defined(BOOST_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_WINDOWS)
+ #define BOOST_LOCALE_WITH_WCONV
+ #endif
+
+--- boost_1_57_0/libs/locale/src/encoding/conv.hpp 2014-04-06 08:11:49.000000000 -0500
++++ boost_1_57_0/libs/locale/src/encoding/conv.hpp 2015-05-04 23:16:08.454000300 -0500
+@@ -59,7 +59,7 @@ namespace boost {
+ return normalize_encoding(l).compare(normalize_encoding(r));
+ }
+
+- #if defined(BOOST_WINDOWS) || defined(__CYGWIN__)
++ #if defined(BOOST_WINDOWS)
+ int encoding_to_windows_codepage(char const *ccharset);
+ #endif
+
+--- boost_1_57_0/libs/locale/src/util/default_locale.cpp 2014-04-06 08:11:49.000000000 -0500
++++ boost_1_57_0/libs/locale/src/util/default_locale.cpp 2015-05-04 23:16:16.311998100 -0500
+@@ -15,7 +15,7 @@
+ # pragma warning(disable : 4996)
+ #endif
+
+-#if defined(BOOST_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_WINDOWS)
+ #ifndef NOMINMAX
+ #define NOMINMAX
+ #endif
+--- boost_1_57_0/libs/locale/test/test_codepage.cpp 2014-04-06 08:11:49.000000000 -0500
++++ boost_1_57_0/libs/locale/test/test_codepage.cpp 2015-05-04 23:16:40.883618300 -0500
+@@ -23,7 +23,7 @@
+ # include
+ #endif
+
+-#if !defined(BOOST_LOCALE_WITH_ICU) && !defined(BOOST_LOCALE_WITH_ICONV) && (defined(BOOST_WINDOWS) || defined(__CYGWIN__))
++#if !defined(BOOST_LOCALE_WITH_ICU) && !defined(BOOST_LOCALE_WITH_ICONV) && defined(BOOST_WINDOWS)
+ #ifndef NOMINMAX
+ # define NOMINMAX
+ #endif
+@@ -395,7 +395,7 @@ int main()
+ def.push_back("posix");
+ #endif
+
+- #if !defined(BOOST_LOCALE_WITH_ICU) && !defined(BOOST_LOCALE_WITH_ICONV) && (defined(BOOST_WINDOWS) || defined(__CYGWIN__))
++ #if !defined(BOOST_LOCALE_WITH_ICU) && !defined(BOOST_LOCALE_WITH_ICONV) && defined(BOOST_WINDOWS)
+ test_iso_8859_8 = IsValidCodePage(28598)!=0;
+ #endif
+
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-log-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-log-cygwin.patch
new file mode 100644
index 00000000000..a7748ec58d8
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-log-cygwin.patch
@@ -0,0 +1,46 @@
+--- boost_1_57_0/boost/log/detail/config.hpp 2014-10-29 19:19:00.000000000 -0500
++++ boost_1_57_0/boost/log/detail/config.hpp 2015-05-04 17:56:38.663746100 -0500
+@@ -96,11 +96,6 @@
+ # define BOOST_LOG_BROKEN_CONSTANT_EXPRESSIONS
+ #endif
+
+-#if defined(__CYGWIN__)
+- // Boost.ASIO is broken on Cygwin
+-# define BOOST_LOG_NO_ASIO
+-#endif
+-
+ #if !defined(BOOST_LOG_USE_NATIVE_SYSLOG) && defined(BOOST_LOG_NO_ASIO)
+ # ifndef BOOST_LOG_WITHOUT_SYSLOG
+ # define BOOST_LOG_WITHOUT_SYSLOG
+--- boost_1_57_0/libs/log/build/Jamfile.v2 2014-10-29 19:19:00.000000000 -0500
++++ boost_1_57_0/libs/log/build/Jamfile.v2 2015-05-04 22:16:49.242537800 -0500
+@@ -170,10 +170,6 @@ project boost/log
+ windows:ws2_32
+ windows:mswsock
+
+- cygwin:__USE_W32_SOCKETS
+- cygwin:ws2_32
+- cygwin:mswsock
+-
+ linux:rt
+ linux:_XOPEN_SOURCE=600
+ linux:_GNU_SOURCE=1
+--- boost_1_57_0/libs/log/src/windows_version.hpp 2014-10-29 19:19:00.000000000 -0500
++++ boost_1_57_0/libs/log/src/windows_version.hpp 2015-05-04 23:17:08.281597400 -0500
+@@ -18,7 +18,7 @@
+
+ #include
+
+-#if defined(BOOST_WINDOWS) || defined(__CYGWIN__)
++#if defined(BOOST_WINDOWS)
+
+ #if defined(BOOST_LOG_USE_WINNT6_API)
+
+@@ -50,6 +50,6 @@
+ #define WIN32_LEAN_AND_MEAN
+ #endif
+
+-#endif // defined(BOOST_WINDOWS) || defined(__CYGWIN__)
++#endif // defined(BOOST_WINDOWS)
+
+ #endif // BOOST_LOG_WINDOWS_VERSION_HPP_INCLUDED_
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-smart_ptr-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-smart_ptr-cygwin.patch
new file mode 100644
index 00000000000..35e6905b0f3
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-smart_ptr-cygwin.patch
@@ -0,0 +1,77 @@
+--- boost_1_57_0/boost/smart_ptr/detail/atomic_count.hpp 2014-08-21 15:48:32.000000000 -0500
++++ boost_1_57_0/boost/smart_ptr/detail/atomic_count.hpp 2015-05-04 17:47:15.556740500 -0500
+@@ -79,7 +79,7 @@
+ #elif defined( BOOST_SP_HAS_SYNC )
+ # include
+
+-#elif defined(WIN32) || defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__)
++#elif defined(WIN32) || defined(_WIN32) || defined(__WIN32__)
+ # include
+
+ #elif defined(__GLIBCPP__) || defined(__GLIBCXX__)
+--- boost_1_57_0/boost/smart_ptr/detail/lightweight_mutex.hpp 2014-08-21 15:48:32.000000000 -0500
++++ boost_1_57_0/boost/smart_ptr/detail/lightweight_mutex.hpp 2015-05-04 17:47:45.234509100 -0500
+@@ -32,7 +32,7 @@
+ # include
+ #elif defined(BOOST_HAS_PTHREADS)
+ # include
+-#elif defined(BOOST_HAS_WINTHREADS) || defined(WIN32) || defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__)
++#elif defined(BOOST_HAS_WINTHREADS) || defined(WIN32) || defined(_WIN32) || defined(__WIN32__)
+ # include
+ #else
+ // Use #define BOOST_DISABLE_THREADS to avoid the error
+--- boost_1_57_0/boost/smart_ptr/detail/sp_counted_base.hpp 2014-08-21 15:48:32.000000000 -0500
++++ boost_1_57_0/boost/smart_ptr/detail/sp_counted_base.hpp 2015-05-04 17:47:45.240009800 -0500
+@@ -65,7 +65,7 @@
+ #elif defined(__GNUC__) && ( defined( __sparcv9 ) || ( defined( __sparcv8 ) && ( __GNUC__ * 100 + __GNUC_MINOR__ >= 402 ) ) )
+ # include
+
+-#elif defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ ) || defined(__CYGWIN__)
++#elif defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ )
+ # include
+
+ #elif defined( _AIX )
+--- boost_1_57_0/boost/smart_ptr/detail/sp_interlocked.hpp 2014-08-21 15:48:32.000000000 -0500
++++ boost_1_57_0/boost/smart_ptr/detail/sp_interlocked.hpp 2015-05-04 17:48:39.316376700 -0500
+@@ -119,7 +119,7 @@ extern "C" long __cdecl _InterlockedExch
+ # define BOOST_SP_INTERLOCKED_EXCHANGE _InterlockedExchange
+ # define BOOST_SP_INTERLOCKED_EXCHANGE_ADD _InterlockedExchangeAdd
+
+-#elif defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ ) || defined( __CYGWIN__ )
++#elif defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ )
+
+ namespace boost
+ {
+--- boost_1_57_0/boost/smart_ptr/detail/spinlock.hpp 2014-08-21 15:48:32.000000000 -0500
++++ boost_1_57_0/boost/smart_ptr/detail/spinlock.hpp 2015-05-04 17:47:45.247510800 -0500
+@@ -49,7 +49,7 @@
+ #elif defined( BOOST_SP_HAS_SYNC )
+ # include
+
+-#elif defined(WIN32) || defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__)
++#elif defined(WIN32) || defined(_WIN32) || defined(__WIN32__)
+ # include
+
+ #elif defined(BOOST_HAS_PTHREADS)
+--- boost_1_57_0/boost/smart_ptr/detail/yield_k.hpp 2014-08-21 15:48:32.000000000 -0500
++++ boost_1_57_0/boost/smart_ptr/detail/yield_k.hpp 2015-05-04 17:47:45.253511600 -0500
+@@ -47,7 +47,7 @@ extern "C" void _mm_pause();
+
+ //
+
+-#if defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ ) || defined( __CYGWIN__ )
++#if defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ )
+
+ #if defined( BOOST_USE_WINDOWS_H )
+ # include
+--- boost_1_57_0/libs/smart_ptr/test/sp_interlocked_test.cpp 2014-08-21 15:48:32.000000000 -0500
++++ boost_1_57_0/libs/smart_ptr/test/sp_interlocked_test.cpp 2015-05-04 23:18:21.717422600 -0500
+@@ -8,7 +8,7 @@
+ // http://www.boost.org/LICENSE_1_0.txt
+ //
+
+-#if defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ ) || defined( __CYGWIN__ )
++#if defined( WIN32 ) || defined( _WIN32 ) || defined( __WIN32__ )
+
+ #include
+ #include
diff --git a/pkgs/development/libraries/boost/cygwin-1.57.0-system-cygwin.patch b/pkgs/development/libraries/boost/cygwin-1.57.0-system-cygwin.patch
new file mode 100644
index 00000000000..e241f37f203
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-1.57.0-system-cygwin.patch
@@ -0,0 +1,22 @@
+--- boost_1_57_0/boost/system/api_config.hpp 2014-08-03 15:44:11.000000000 -0500
++++ boost_1_57_0/boost/system/api_config.hpp 2015-05-04 17:51:31.189701800 -0500
+@@ -33,7 +33,7 @@
+ // Standalone MinGW and all other known Windows compilers do predefine _WIN32
+ // Compilers that predefine _WIN32 or __MINGW32__ do so for Windows 64-bit builds too.
+
+-# if defined(_WIN32) || defined(__CYGWIN__) // Windows default, including MinGW and Cygwin
++# if defined(_WIN32) // Windows default, including MinGW and Cygwin
+ # define BOOST_WINDOWS_API
+ # else
+ # define BOOST_POSIX_API
+--- boost_1_57_0/boost/system/detail/error_code.ipp 2014-08-03 15:44:11.000000000 -0500
++++ boost_1_57_0/boost/system/detail/error_code.ipp 2015-05-04 17:51:02.925112700 -0500
+@@ -97,7 +97,7 @@ namespace
+ char buf[64];
+ char * bp = buf;
+ std::size_t sz = sizeof(buf);
+- # if defined(__CYGWIN__) || defined(__USE_GNU)
++ # if defined(__GNU_VISIBLE) || defined(__USE_GNU)
+ // Oddball version of strerror_r
+ const char * c_str = strerror_r( ev, bp, sz );
+ return c_str
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.50.0-fix-non-utf8-files.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.50.0-fix-non-utf8-files.patch
new file mode 100644
index 00000000000..b60a3ac49d3
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.50.0-fix-non-utf8-files.patch
@@ -0,0 +1,22 @@
+diff --git a/libs/units/example/autoprefixes.cpp b/libs/units/example/autoprefixes.cpp
+index 8b2bc43..d04f2fe 100644
+--- a/libs/units/example/autoprefixes.cpp
++++ b/libs/units/example/autoprefixes.cpp
+@@ -67,7 +67,7 @@ struct thing_base_unit : boost::units::base_unit
+ {
+ static const char* name() { return("EUR"); }
+- static const char* symbol() { return("€"); }
++ static const char* symbol() { return("€"); }
+ };
+
+ int main()
+@@ -140,7 +140,7 @@ int main()
+
+ quantity ce = 2048. * euro_base_unit::unit_type();
+ cout << name_format << engineering_prefix << ce << endl; // 2.048 kiloEUR
+- cout << symbol_format << engineering_prefix << ce << endl; // 2.048 k€
++ cout << symbol_format << engineering_prefix << ce << endl; // 2.048 k€
+
+
+ return 0;
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.50.0-pool.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.50.0-pool.patch
new file mode 100644
index 00000000000..15ce4007675
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.50.0-pool.patch
@@ -0,0 +1,122 @@
+Index: boost/pool/pool.hpp
+===================================================================
+--- a/boost/pool/pool.hpp (revision 78317)
++++ b/boost/pool/pool.hpp (revision 78326)
+@@ -27,4 +27,6 @@
+ #include
+
++// std::numeric_limits
++#include
+ // boost::math::static_lcm
+ #include
+@@ -358,4 +360,13 @@
+ }
+
++ size_type max_chunks() const
++ { //! Calculated maximum number of memory chunks that can be allocated in a single call by this Pool.
++ size_type partition_size = alloc_size();
++ size_type POD_size = math::static_lcm::value + sizeof(size_type);
++ size_type max_chunks = (std::numeric_limits::max() - POD_size) / alloc_size();
++
++ return max_chunks;
++ }
++
+ static void * & nextof(void * const ptr)
+ { //! \returns Pointer dereferenced.
+@@ -377,5 +388,7 @@
+ //! the first time that object needs to allocate system memory.
+ //! The default is 32. This parameter may not be 0.
+- //! \param nmax_size is the maximum number of chunks to allocate in one block.
++ //! \param nmax_size is the maximum number of chunks to allocate in one block.
++ set_next_size(nnext_size);
++ set_max_size(nmax_size);
+ }
+
+@@ -400,7 +413,7 @@
+ }
+ void set_next_size(const size_type nnext_size)
+- { //! Set number of chunks to request from the system the next time that object needs to allocate system memory. This value should never be set to 0.
+- //! \returns nnext_size.
+- next_size = start_size = nnext_size;
++ { //! Set number of chunks to request from the system the next time that object needs to allocate system memory. This value should never be set to 0.
++ BOOST_USING_STD_MIN();
++ next_size = start_size = min BOOST_PREVENT_MACRO_SUBSTITUTION(nnext_size, max_chunks());
+ }
+ size_type get_max_size() const
+@@ -410,5 +423,6 @@
+ void set_max_size(const size_type nmax_size)
+ { //! Set max_size.
+- max_size = nmax_size;
++ BOOST_USING_STD_MIN();
++ max_size = min BOOST_PREVENT_MACRO_SUBSTITUTION(nmax_size, max_chunks());
+ }
+ size_type get_requested_size() const
+@@ -713,7 +727,7 @@
+ BOOST_USING_STD_MIN();
+ if(!max_size)
+- next_size <<= 1;
++ set_next_size(next_size << 1);
+ else if( next_size*partition_size/requested_size < max_size)
+- next_size = min BOOST_PREVENT_MACRO_SUBSTITUTION(next_size << 1, max_size*requested_size/ partition_size);
++ set_next_size(min BOOST_PREVENT_MACRO_SUBSTITUTION(next_size << 1, max_size * requested_size / partition_size));
+
+ // initialize it,
+@@ -753,7 +767,7 @@
+ BOOST_USING_STD_MIN();
+ if(!max_size)
+- next_size <<= 1;
++ set_next_size(next_size << 1);
+ else if( next_size*partition_size/requested_size < max_size)
+- next_size = min BOOST_PREVENT_MACRO_SUBSTITUTION(next_size << 1, max_size*requested_size/ partition_size);
++ set_next_size(min BOOST_PREVENT_MACRO_SUBSTITUTION(next_size << 1, max_size * requested_size / partition_size));
+
+ // initialize it,
+@@ -797,4 +811,6 @@
+ //! \returns Address of chunk n if allocated ok.
+ //! \returns 0 if not enough memory for n chunks.
++ if (n > max_chunks())
++ return 0;
+
+ const size_type partition_size = alloc_size();
+@@ -845,7 +861,7 @@
+ BOOST_USING_STD_MIN();
+ if(!max_size)
+- next_size <<= 1;
++ set_next_size(next_size << 1);
+ else if( next_size*partition_size/requested_size < max_size)
+- next_size = min BOOST_PREVENT_MACRO_SUBSTITUTION(next_size << 1, max_size*requested_size/ partition_size);
++ set_next_size(min BOOST_PREVENT_MACRO_SUBSTITUTION(next_size << 1, max_size * requested_size / partition_size));
+
+ // insert it into the list,
+Index: libs/pool/test/test_bug_6701.cpp
+===================================================================
+--- a/libs/pool/test/test_bug_6701.cpp (revision 78326)
++++ b/libs/pool/test/test_bug_6701.cpp (revision 78326)
+@@ -0,0 +1,27 @@
++/* Copyright (C) 2012 Étienne Dupuis
++*
++* Use, modification and distribution is subject to the
++* Boost Software License, Version 1.0. (See accompanying
++* file LICENSE_1_0.txt or http://www.boost.org/LICENSE_1_0.txt)
++*/
++
++// Test of bug #6701 (https://svn.boost.org/trac/boost/ticket/6701)
++
++#include
++#include
++
++int main()
++{
++ boost::pool<> p(1024, std::numeric_limits::max() / 768);
++
++ void *x = p.malloc();
++ BOOST_ASSERT(!x);
++
++ BOOST_ASSERT(std::numeric_limits::max() / 1024 >= p.get_next_size());
++ BOOST_ASSERT(std::numeric_limits::max() / 1024 >= p.get_max_size());
++
++ void *y = p.ordered_malloc(std::numeric_limits::max() / 768);
++ BOOST_ASSERT(!y);
++
++ return 0;
++}
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-locale-unused_typedef.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-locale-unused_typedef.patch
new file mode 100644
index 00000000000..b7c91284d9b
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-locale-unused_typedef.patch
@@ -0,0 +1,11 @@
+diff -urp boost_1_54_0-orig/boost/locale/boundary/segment.hpp boost_1_54_0/boost/locale/boundary/segment.hpp
+--- boost_1_54_0-orig/boost/locale/boundary/segment.hpp 2013-07-23 00:47:27.020787174 +0200
++++ boost_1_54_0/boost/locale/boundary/segment.hpp 2013-07-23 00:50:40.382959016 +0200
+@@ -27,7 +27,6 @@ namespace boundary {
+ int compare_text(LeftIterator l_begin,LeftIterator l_end,RightIterator r_begin,RightIterator r_end)
+ {
+ typedef LeftIterator left_iterator;
+- typedef RightIterator right_iterator;
+ typedef typename std::iterator_traits::value_type char_type;
+ typedef std::char_traits traits;
+ while(l_begin!=l_end && r_begin!=r_end) {
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-pool-max_chunks_shadow.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-pool-max_chunks_shadow.patch
new file mode 100644
index 00000000000..6c1d0a021ed
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-pool-max_chunks_shadow.patch
@@ -0,0 +1,14 @@
+diff -up ./boost/pool/pool.hpp~ ./boost/pool/pool.hpp
+--- a/boost/pool/pool.hpp~ 2013-08-21 17:49:56.023296922 +0200
++++ b/boost/pool/pool.hpp 2013-08-22 11:38:01.133912638 +0200
+@@ -361,9 +361,7 @@ class pool: protected simple_segregated_
+ { //! Calculated maximum number of memory chunks that can be allocated in a single call by this Pool.
+ size_type partition_size = alloc_size();
+ size_type POD_size = math::static_lcm::value + sizeof(size_type);
+- size_type max_chunks = (std::numeric_limits::max() - POD_size) / alloc_size();
+-
+- return max_chunks;
++ return (std::numeric_limits::max() - POD_size) / alloc_size();
+ }
+
+ static void * & nextof(void * const ptr)
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-python-unused_typedef.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-python-unused_typedef.patch
new file mode 100644
index 00000000000..8adf8ed2080
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.54.0-python-unused_typedef.patch
@@ -0,0 +1,15 @@
+diff -up boost_1_53_0/boost/python/to_python_value.hpp\~ boost_1_53_0/boost/python/to_python_value.hpp
+--- boost_1_53_0/boost/python/to_python_value.hpp~ 2007-12-16 11:12:07.000000000 +0100
++++ boost_1_53_0/boost/python/to_python_value.hpp 2013-07-23 16:19:02.518904596 +0200
+@@ -147,8 +147,8 @@ namespace detail
+ template
+ inline PyObject* registry_to_python_value::operator()(argument_type x) const
+ {
+- typedef converter::registered r;
+ # if BOOST_WORKAROUND(__GNUC__, < 3)
++ typedef converter::registered r;
+ // suppresses an ICE, somehow
+ (void)r::converters;
+ # endif
+
+Diff finished. Tue Jul 23 16:19:05 2013
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-move-is_class.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-move-is_class.patch
new file mode 100644
index 00000000000..cf9756e40ea
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-move-is_class.patch
@@ -0,0 +1,20 @@
+diff -up ./move/core.hpp~ ./move/core.hpp
+--- a/boost/move/core.hpp~ 2015-02-09 17:33:35.000000000 +0100
++++ b/boost/move/core.hpp 2015-02-13 13:54:52.012130813 +0100
+@@ -43,6 +43,7 @@
+ #if defined(BOOST_NO_CXX11_RVALUE_REFERENCES) && !defined(BOOST_MOVE_DOXYGEN_INVOKED)
+
+ #include
++ #include
+
+ //Move emulation rv breaks standard aliasing rules so add workarounds for some compilers
+ #if defined(__GNUC__) && (__GNUC__ >= 4) && \
+@@ -65,7 +66,7 @@
+ template
+ class rv
+ : public ::boost::move_detail::if_c
+- < ::boost::move_detail::is_class_or_union::value
++ < ::boost::is_class::value
+ , T
+ , ::boost::move_detail::nat
+ >::type
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-mpl-print.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-mpl-print.patch
new file mode 100644
index 00000000000..561cef19eb2
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-mpl-print.patch
@@ -0,0 +1,31 @@
+diff -up boost_1_57_0/boost/mpl/print.hpp\~ boost_1_57_0/boost/mpl/print.hpp
+--- boost_1_57_0/boost/mpl/print.hpp~ 2014-07-09 23:12:31.000000000 +0200
++++ boost_1_57_0/boost/mpl/print.hpp 2015-01-20 12:44:59.621400948 +0100
+@@ -52,16 +52,15 @@ struct print
+ enum { n = sizeof(T) + -1 };
+ #elif defined(__MWERKS__)
+ void f(int);
+-#else
+- enum {
+- n =
+-# if defined(__EDG_VERSION__)
+- aux::dependent_unsigned::value > -1
+-# else
+- sizeof(T) > -1
+-# endif
+- };
+-#endif
++#elif defined(__EDG_VERSION__)
++ enum { n = aux::dependent_unsigned::value > -1 };
++#elif defined(BOOST_GCC)
++ enum { n1 };
++ enum { n2 };
++ enum { n = n1 != n2 };
++#else
++ enum { n = sizeof(T) > -1 };
++#endif
+ };
+
+ #if defined(BOOST_MSVC)
+
+Diff finished. Tue Jan 20 12:45:03 2015
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-pool-test_linking.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-pool-test_linking.patch
new file mode 100644
index 00000000000..57e6206bba1
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-pool-test_linking.patch
@@ -0,0 +1,33 @@
+diff -up boost_1_57_0/libs/pool/test/Jamfile.v2\~ boost_1_57_0/libs/pool/test/Jamfile.v2
+--- boost_1_57_0/libs/pool/test/Jamfile.v2~ 2014-07-10 06:36:10.000000000 +0200
++++ boost_1_57_0/libs/pool/test/Jamfile.v2 2015-01-20 13:59:10.818700586 +0100
+@@ -28,17 +28,17 @@ explicit valgrind_config_check ;
+ local use-valgrind = [ check-target-builds valgrind_config_check "valgrind" : "valgrind --error-exitcode=1" : no ] ;
+
+ test-suite pool :
+- [ run test_simple_seg_storage.cpp ]
+- [ run test_pool_alloc.cpp ]
+- [ run pool_msvc_compiler_bug_test.cpp ]
+- [ run test_msvc_mem_leak_detect.cpp ]
+- [ run test_bug_3349.cpp ]
+- [ run test_bug_4960.cpp ]
+- [ run test_bug_1252.cpp ]
+- [ run test_bug_2696.cpp ]
+- [ run test_bug_5526.cpp ]
++ [ run test_simple_seg_storage.cpp : : : /boost/system//boost_system ]
++ [ run test_pool_alloc.cpp : : : /boost/system//boost_system ]
++ [ run pool_msvc_compiler_bug_test.cpp : : : /boost/system//boost_system ]
++ [ run test_msvc_mem_leak_detect.cpp : : : /boost/system//boost_system ]
++ [ run test_bug_3349.cpp : : : /boost/system//boost_system ]
++ [ run test_bug_4960.cpp : : : /boost/system//boost_system ]
++ [ run test_bug_1252.cpp : : : /boost/system//boost_system ]
++ [ run test_bug_2696.cpp : : : /boost/system//boost_system ]
++ [ run test_bug_5526.cpp : : : /boost/system//boost_system ]
+ [ run test_threading.cpp : : : multi /boost/thread//boost_thread gcc:-Wno-attributes gcc:-Wno-missing-field-initializers ]
+- [ run ../example/time_pool_alloc.cpp ]
++ [ run ../example/time_pool_alloc.cpp : : : /boost/system//boost_system ]
+ [ compile test_poisoned_macros.cpp ]
+
+ #
+
+Diff finished. Tue Jan 20 13:59:16 2015
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-signals2-weak_ptr.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-signals2-weak_ptr.patch
new file mode 100644
index 00000000000..eb9ea14011f
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-signals2-weak_ptr.patch
@@ -0,0 +1,10 @@
+--- a/boost/signals2/trackable.hpp
++++ b/boost/signals2/trackable.hpp
+@@ -18,6 +18,7 @@
+
+ #include
+ #include
++#include
+
+ namespace boost {
+ namespace signals2 {
diff --git a/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-spirit-unused_typedef.patch b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-spirit-unused_typedef.patch
new file mode 100644
index 00000000000..282962987c5
--- /dev/null
+++ b/pkgs/development/libraries/boost/cygwin-fedora-boost-1.57.0-spirit-unused_typedef.patch
@@ -0,0 +1,19 @@
+diff -up boost_1_57_0/boost/spirit/home/classic/core/non_terminal/impl/grammar.ipp\~ boost_1_57_0/boost/spirit/home/classic/core/non_terminal/impl/grammar.ipp
+--- boost_1_57_0/boost/spirit/home/classic/core/non_terminal/impl/grammar.ipp~ 2014-10-13 12:21:40.000000000 +0200
++++ boost_1_57_0/boost/spirit/home/classic/core/non_terminal/impl/grammar.ipp 2015-01-20 13:25:50.069710766 +0100
+@@ -282,12 +282,12 @@ struct grammar_definition
+ #if !defined(BOOST_SPIRIT_SINGLE_GRAMMAR_INSTANCE)
+ typedef impl::grammar_helper_base